An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longname, causing an out-of-bounds read.
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "binaries": [ { "binary_name": "libtar-dev", "binary_version": "1.2.20-4ubuntu0.1~esm1" }, { "binary_name": "libtar0", "binary_version": "1.2.20-4ubuntu0.1~esm1" } ] }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "binaries": [ { "binary_name": "libtar-dev", "binary_version": "1.2.20-7ubuntu0.1~esm1" }, { "binary_name": "libtar0", "binary_version": "1.2.20-7ubuntu0.1~esm1" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_name": "libtar-dev", "binary_version": "1.2.20-8ubuntu0.20.04.1" }, { "binary_name": "libtar0", "binary_version": "1.2.20-8ubuntu0.20.04.1" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_name": "libtar-dev", "binary_version": "1.2.20-8ubuntu0.22.04.1" }, { "binary_name": "libtar0", "binary_version": "1.2.20-8ubuntu0.22.04.1" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_name": "libtar-dev", "binary_version": "1.2.20-8.1ubuntu0.24.04.1" }, { "binary_name": "libtar0t64", "binary_version": "1.2.20-8.1ubuntu0.24.04.1" } ] }