An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longname, causing an out-of-bounds read.
2022-08-10T20:15:20.517
2025-04-02T18:33:53.340
Modified
CVSSv3.1: 8.1 (HIGH)
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | feep | libtar | < 1.2.21 | Yes |
Operating System | openatom | openeuler | 20.03 | Yes |
Operating System | openatom | openeuler | 20.03 | Yes |
Operating System | openatom | openeuler | 22.03 | Yes |
Operating System | fedoraproject | fedora | 35 | Yes |
Operating System | fedoraproject | fedora | 36 | Yes |
Operating System | fedoraproject | fedora | 37 | Yes |