Количество 30
Количество 30
CVE-2021-33646
The th_read() function doesn\u2019t free a variable t->th_buf.gnu_long ...

CVE-2021-33644
An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longname, causing an out-of-bounds read.

CVE-2021-33644
An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longname, causing an out-of-bounds read.

CVE-2021-33644
An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longname, causing an out-of-bounds read.

CVE-2021-33644
CVE-2021-33644
An attacker who submits a crafted tar file with size in header struct ...
GHSA-x27v-rjqh-f4xc
The th_read() function doesn’t free a variable t->th_buf.gnu_longname after allocating memory, which may cause a memory leak.
GHSA-f326-p7mm-52h2
An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longname, causing an out-of-bounds read.

BDU:2025-05003
Уязвимость пакета libtar, связанная с чтением вне границ памяти, позволяющая нарушителю получить доступ к конфиденциальной информации

BDU:2025-05001
Уязвимость функции th_read() пакета libtar, позволяющая нарушителю получить доступ к конфиденциальной информации
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
CVE-2021-33646 The th_read() function doesn\u2019t free a variable t->th_buf.gnu_long ... | CVSS3: 7.5 | 0% Низкий | почти 3 года назад | |
![]() | CVE-2021-33644 An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longname, causing an out-of-bounds read. | CVSS3: 8.1 | 0% Низкий | почти 3 года назад |
![]() | CVE-2021-33644 An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longname, causing an out-of-bounds read. | CVSS3: 6.8 | 0% Низкий | почти 3 года назад |
![]() | CVE-2021-33644 An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longname, causing an out-of-bounds read. | CVSS3: 8.1 | 0% Низкий | почти 3 года назад |
![]() | CVSS3: 8.1 | 0% Низкий | почти 3 года назад | |
CVE-2021-33644 An attacker who submits a crafted tar file with size in header struct ... | CVSS3: 8.1 | 0% Низкий | почти 3 года назад | |
GHSA-x27v-rjqh-f4xc The th_read() function doesn’t free a variable t->th_buf.gnu_longname after allocating memory, which may cause a memory leak. | CVSS3: 7.5 | 0% Низкий | почти 3 года назад | |
GHSA-f326-p7mm-52h2 An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longname, causing an out-of-bounds read. | CVSS3: 8.1 | 0% Низкий | почти 3 года назад | |
![]() | BDU:2025-05003 Уязвимость пакета libtar, связанная с чтением вне границ памяти, позволяющая нарушителю получить доступ к конфиденциальной информации | CVSS3: 8.1 | 0% Низкий | почти 3 года назад |
![]() | BDU:2025-05001 Уязвимость функции th_read() пакета libtar, позволяющая нарушителю получить доступ к конфиденциальной информации | CVSS3: 7.5 | 0% Низкий | почти 3 года назад |
Уязвимостей на страницу