MGASA-2022-0335

Source
https://advisories.mageia.org/MGASA-2022-0335.html
Import Source
https://advisories.mageia.org/MGASA-2022-0335.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2022-0335
Related
Published
2022-09-16T19:39:55Z
Modified
2022-09-16T18:44:06Z
Summary
Updated libtar packages fix security vulnerability
Details

An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longlink, causing an out-of-bounds read. (CVE-2021-33643)

An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longname, causing an out-of-bounds read. (CVE-2021-33644)

The thread() function doesn't free a variable t->thbuf.gnu_longlink after allocating memory, which may cause a memory leak. (CVE-2021-33645)

The thread() function doesn't free a variable t->thbuf.gnu_longname after allocating memory, which may cause a memory leak. (CVE-2021-33646)

References
Credits

Affected packages