Lucene search

K
mageiaGentoo FoundationMGASA-2022-0335
HistorySep 16, 2022 - 10:39 p.m.

Updated libtar packages fix security vulnerability

2022-09-1622:39:55
Gentoo Foundation
advisories.mageia.org
12

0.003 Low

EPSS

Percentile

71.4%

An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longlink, causing an out-of-bounds read. (CVE-2021-33643) An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longname, causing an out-of-bounds read. (CVE-2021-33644) The th_read() function doesn’t free a variable t->th_buf.gnu_longlink after allocating memory, which may cause a memory leak. (CVE-2021-33645) The th_read() function doesn’t free a variable t->th_buf.gnu_longname after allocating memory, which may cause a memory leak. (CVE-2021-33646)

OSVersionArchitecturePackageVersionFilename
Mageia8noarchlibtar< 1.2.20-9.1libtar-1.2.20-9.1.mga8