CVE-2021-33644

Publication date 10 August 2022

Last updated 31 March 2025


Ubuntu priority

Cvss 3 Severity Score

8.1 · High

Score breakdown

An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longname, causing an out-of-bounds read.

Read the notes from the security team

Status

Package Ubuntu Release Status
libtar 24.10 oracular
Vulnerable
24.04 LTS noble
Vulnerable
23.10 mantic Ignored end of life, was needs-triage
23.04 lunar Ignored end of life, was needs-triage
22.10 kinetic Ignored end of life, was needs-triage
22.04 LTS jammy
Vulnerable
20.04 LTS focal
Vulnerable
18.04 LTS bionic
Vulnerable
16.04 LTS xenial
Vulnerable
14.04 LTS trusty Ignored end of standard support

Notes


john-breton

Upstream never released a patch, but a third-party patch exists from OpenEuler. The patch fixes CVE-2021-33643 and CVE-2021-33644.

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
libtar

Severity score breakdown

Parameter Value
Base score 8.1 · High
Attack vector Network
Attack complexity Low
Privileges required None
User interaction Required
Scope Unchanged
Confidentiality High
Integrity impact None
Availability impact High
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H