MGASA-2021-0233

Source
https://advisories.mageia.org/MGASA-2021-0233.html
Import Source
https://advisories.mageia.org/MGASA-2021-0233.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2021-0233
Related
Published
2021-06-08T14:33:02Z
Modified
2021-06-07T08:37:18Z
Summary
Updated tar package fix a security vulnerability
Details

A flaw was found in the src/list.c of tar 1.33 and earlier. This flaw allows an attacker who can submit a crafted input file to tar to cause uncontrolled consumption of memory. The highest threat from this vulnerability is to system availability (CVE-2021-20193).

References
Credits

Affected packages

Mageia:8 / tar

Package

Name
tar
Purl
pkg:rpm/mageia/tar?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.33-2.1.mga8

Ecosystem specific

{
    "section": "core"
}

Mageia:7 / tar

Package

Name
tar
Purl
pkg:rpm/mageia/tar?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.32-1.1.mga7

Ecosystem specific

{
    "section": "core"
}