Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-33643

Опубликовано: 10 авг. 2022
Источник: debian
EPSS Низкий

Описание

An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longlink, causing an out-of-bounds read.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libtarremovedpackage
libtarfixed1.2.20-8+deb12u1bookwormpackage

Примечания

  • https://bugzilla.redhat.com/show_bug.cgi?id=2121289

  • (not-upstream) patch from OpenEuler: https://gitee.com/src-openeuler/libtar/blob/master/openEuler-CVE-2021-33643-CVE-2021-33644.patch

EPSS

Процентиль: 38%
0.00159
Низкий

Связанные уязвимости

CVSS3: 9.1
ubuntu
почти 3 года назад

An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longlink, causing an out-of-bounds read.

CVSS3: 7.4
redhat
почти 3 года назад

An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longlink, causing an out-of-bounds read.

CVSS3: 9.1
nvd
почти 3 года назад

An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longlink, causing an out-of-bounds read.

CVSS3: 9.1
msrc
почти 3 года назад

Описание отсутствует

CVSS3: 9.1
github
почти 3 года назад

An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longlink, causing an out-of-bounds read.

EPSS

Процентиль: 38%
0.00159
Низкий