archive_tar is vulnerable to directory traversal. The vulnerability exists due to the lack of sanitization of symbolic links to out-of-path filenames, allowing an attacker to inject ../
characters in a file or folder name to perform symlink attacks.
github.com/pear/Archive_Tar/commit/cde460582ff389404b5b3ccb59374e9b389de916
lists.debian.org/debian-lts-announce/2021/01/msg00018.html
lists.debian.org/debian-lts-announce/2021/04/msg00007.html
lists.fedoraproject.org/archives/list/[email protected]/message/42GPGVVFTLJYAKRI75IVB5R45NYQGEUR/
lists.fedoraproject.org/archives/list/[email protected]/message/FOZNK4FIIV7FSFCJNNFWMJZTTV7NFJV2/
lists.fedoraproject.org/archives/list/[email protected]/message/VJQQYDAOWHD6RDITDRPHFW7WY6BS3V5N/
lists.fedoraproject.org/archives/list/[email protected]/message/YKD5WEFA4WT6AVTMRAYBNXZNLWZHM7FH/
security.gentoo.org/glsa/202101-23
www.debian.org/security/2021/dsa-4894
www.drupal.org/sa-core-2021-001