Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-33644

Опубликовано: 10 авг. 2022
Источник: debian
EPSS Низкий

Описание

An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longname, causing an out-of-bounds read.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libtarremovedpackage
libtarfixed1.2.20-8+deb12u1bookwormpackage

Примечания

  • https://bugzilla.redhat.com/show_bug.cgi?id=2121292

  • (not-upstream) patch from OpenEuler: https://gitee.com/src-openeuler/libtar/blob/master/openEuler-CVE-2021-33643-CVE-2021-33644.patch

EPSS

Процентиль: 38%
0.00159
Низкий

Связанные уязвимости

CVSS3: 8.1
ubuntu
почти 3 года назад

An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longname, causing an out-of-bounds read.

CVSS3: 6.8
redhat
почти 3 года назад

An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longname, causing an out-of-bounds read.

CVSS3: 8.1
nvd
почти 3 года назад

An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longname, causing an out-of-bounds read.

CVSS3: 8.1
msrc
почти 3 года назад

Описание отсутствует

CVSS3: 8.1
github
почти 3 года назад

An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longname, causing an out-of-bounds read.

EPSS

Процентиль: 38%
0.00159
Низкий