Vulnerability Description
An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longlink, causing an out-of-bounds read.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Feep | Libtar | < 1.2.21 |
| Openatom | Openeuler | 20.03 |
| Fedoraproject | Fedora | 35 |
Related Weaknesses (CWE)
References
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SBroken LinkThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2025/01/msg00026.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SBroken LinkThird Party Advisory
FAQ
What is CVE-2021-33643?
CVE-2021-33643 is a vulnerability with a CVSS score of 9.1 (CRITICAL). An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longlink, causing an out-of-bounds read.
How severe is CVE-2021-33643?
CVE-2021-33643 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2021-33643?
Check the references section above for vendor advisories and patch information. Affected products include: Feep Libtar, Openatom Openeuler, Fedoraproject Fedora.