Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2023:2898

Опубликовано: 27 дек. 2025
Источник: rocky
Оценка: Moderate

Описание

Moderate: libtar security update

The libtar packages contain a C library for manipulating tar archives. The library supports both the strict POSIX tar format and many of the commonly used GNU extensions.

Security Fix(es):

  • libtar: out-of-bounds read in gnu_longlink (CVE-2021-33643)

  • libtar: out-of-bounds read in gnu_longname (CVE-2021-33644)

  • libtar: memory leak found in th_read() function (CVE-2021-33645)

  • libtar: memory leak found in th_read() function (CVE-2021-33646)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section.

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
libtari68617.el8libtar-1.2.20-17.el8.i686.rpm
libtarx86_6417.el8libtar-1.2.20-17.el8.x86_64.rpm

Показывать по

Связанные уязвимости

oracle-oval
больше 2 лет назад

ELSA-2023-2898: libtar security update (MODERATE)

CVSS3: 9.1
redos
10 месяцев назад

Множественные уязвимости libtar

CVSS3: 9.1
ubuntu
больше 3 лет назад

An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longlink, causing an out-of-bounds read.

CVSS3: 7.4
redhat
больше 3 лет назад

An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longlink, causing an out-of-bounds read.

CVSS3: 9.1
nvd
больше 3 лет назад

An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longlink, causing an out-of-bounds read.