Name | CVE-2021-33644 |
Description | An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longname, causing an out-of-bounds read. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-4033-1 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
libtar (PTS) | bullseye (security) | 1.2.20-8+deb12u1~deb11u1 | fixed |
| bookworm, bullseye | 1.2.20-8 | vulnerable |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
libtar | source | bullseye | 1.2.20-8+deb12u1~deb11u1 | | DLA-4033-1 | |
libtar | source | (unstable) | (unfixed) | | | |
Notes
[bookworm] - libtar <no-dsa> (Minor issue)
https://bugzilla.redhat.com/show_bug.cgi?id=2121292
(not-upstream) patch from OpenEuler: https://gitee.com/src-openeuler/libtar/blob/master/openEuler-CVE-2021-33643-CVE-2021-33644.patch