2024-12-12 21:07:30 +00:00

126 lines
4.6 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20237462",
"Version": "oval:org.altlinux.errata:def:20237462",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2023-7462: package `libtar` update to version 1.2.20-alt3.git.6d0ab4c",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p11"
],
"Products": [
"ALT Container"
]
}
],
"References": [
{
"RefID": "ALT-PU-2023-7462",
"RefURL": "https://errata.altlinux.org/ALT-PU-2023-7462",
"Source": "ALTPU"
},
{
"RefID": "CVE-2021-33643",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-33643",
"Source": "CVE"
},
{
"RefID": "CVE-2021-33644",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-33644",
"Source": "CVE"
},
{
"RefID": "CVE-2021-33645",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-33645",
"Source": "CVE"
},
{
"RefID": "CVE-2021-33646",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-33646",
"Source": "CVE"
}
],
"Description": "This update upgrades libtar to version 1.2.20-alt3.git.6d0ab4c. \nSecurity Fix(es):\n\n * CVE-2021-33643: An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longlink, causing an out-of-bounds read.\n\n * CVE-2021-33644: An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longname, causing an out-of-bounds read.\n\n * CVE-2021-33645: The th_read() function doesnt free a variable t-\u003eth_buf.gnu_longlink after allocating memory, which may cause a memory leak.\n\n * CVE-2021-33646: The th_read() function doesnt free a variable t-\u003eth_buf.gnu_longname after allocating memory, which may cause a memory leak.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2023-11-22"
},
"Updated": {
"Date": "2023-11-22"
},
"BDUs": null,
"CVEs": [
{
"ID": "CVE-2021-33643",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-33643",
"Impact": "Critical",
"Public": "20220810"
},
{
"ID": "CVE-2021-33644",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-33644",
"Impact": "High",
"Public": "20220810"
},
{
"ID": "CVE-2021-33645",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-33645",
"Impact": "High",
"Public": "20220810"
},
{
"ID": "CVE-2021-33646",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-33646",
"Impact": "High",
"Public": "20220810"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:container:11"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20237462001",
"Comment": "libtar is earlier than 0:1.2.20-alt3.git.6d0ab4c"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20237462002",
"Comment": "libtar-devel is earlier than 0:1.2.20-alt3.git.6d0ab4c"
}
]
}
]
}
}
]
}