CVE-2021-20193

A flaw was found in the src/list.c of tar 1.33 and earlier. This flaw allows an attacker who can submit a crafted input file to tar to cause uncontrolled consumption of memory. The highest threat from this vulnerability is to system availability.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
3.3 LOW
LOCAL
LOW
NONE
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 21%
VendorProductVersion
gnutar
𝑥
≤ 1.33
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
tar
bullseye
1.34+dfsg-1+deb11u1
fixed
bookworm
1.34+dfsg-1.2+deb12u1
fixed
sid
1.35+dfsg-3
fixed
trixie
1.35+dfsg-3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
tar
lunar
Fixed 1.34+dfsg-1build1
released
kinetic
Fixed 1.34+dfsg-1build1
released
jammy
Fixed 1.34+dfsg-1build1
released
impish
Fixed 1.34+dfsg-1build1
released
hirsute
Fixed 1.34+dfsg-1build1
released
groovy
ignored
focal
Fixed 1.30+dfsg-7ubuntu0.20.04.2
released
bionic
Fixed 1.29b-2ubuntu0.3
released
xenial
Fixed 1.28-2.1ubuntu0.2+esm1
released
trusty
Fixed 1.27.1-1ubuntu0.1+esm2
released