Multiple integer overflows in the th_read function in lib/block.c in libtar before 1.2.20 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long (1) name or (2) link in an archive, which triggers a heap-based buffer overflow.
https://source.android.com/security/bulletin/2018-01-01
https://lists.feep.net:8080/pipermail/libtar/2013-October/000361.html
http://www.securitytracker.com/id/1040106
http://www.securitytracker.com/id/1029166
http://www.securityfocus.com/bid/62922
http://www.openwall.com/lists/oss-security/2013/10/10/6
http://www.openwall.com/lists/oss-security/2013/10/10/4
http://www.debian.org/security/2013/dsa-2817
http://secunia.com/advisories/55253