A flaw was found in the src/list.c of tar 1.33 and earlier. This flaw allows an attacker who can submit a crafted input file to tar to cause uncontrolled consumption of memory. The highest threat from this vulnerability is to system availability.
https://security.gentoo.org/glsa/202105-29
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777
https://bugzilla.redhat.com/show_bug.cgi?id=1917565
https://savannah.gnu.org/bugs/?59897
Source: Mitre, NVD
Published: 2021-03-26
Updated: 2025-05-05
Base Score: 4.3
Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P
Severity: Medium
Base Score: 3.3
Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
Severity: Low
EPSS: 0.00069