A flaw was found in tar. A remote attacker could exploit this vulnerability by crafting a malicious archive, leading to hidden file injection with fully attacker-controlled content. This bypasses pre-extraction inspection mechanisms, potentially allowing an attacker to introduce malicious files onto a system without detection.
| Vendor | Product | Versions |
|---|---|---|
| red hat | red hat enterprise linux | — |
Updated severity to CRITICAL and corrected exploit availability to false.
Initial creation