| Summary: | libtar new security issue CVE-2021-33640 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | major | ||
| Priority: | Normal | CC: | andrewsfarm, davidwhodgins, herman.viaene, nicolas.salguero, sysadmin-bugs |
| Version: | 8 | Keywords: | advisory, validated_update |
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | MGA8-64-OK | ||
| Source RPM: | libtar-1.2.20-9.1.mga8.src.rpm | CVE: | CVE-2021-33640 |
| Status comment: | |||
|
Description
David Walser
2022-12-28 18:00:22 CET
David Walser
2022-12-28 18:00:41 CET
Whiteboard:
(none) =>
MGA8TOO
David Walser
2022-12-28 18:00:58 CET
CC:
(none) =>
nicolas.salguero Assigning gobally as libtar has no evident maintainer. NicolasS (who did last CVE update) is already CC'd. Assignee:
bugsquad =>
pkg-bugs Suggested advisory: ======================== The updated packages fix a security vulnerability: After tar_close(), libtar.c releases the memory pointed to by pointer t. After tar_close() is called in the list() function, it continues to use pointer t: free_longlink_longname(t->th_buf) . As a result, the released memory is used (use-after-free). (CVE-2021-33640) References: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33640 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/4S4PJRCJLEAWN2EKXGLSOBTL7O57V7NC/ ======================== Updated packages in core/updates_testing: ======================== libtar-1.2.20-9.2.mga8 lib(64)tar0-1.2.20-9.2.mga8 lib(64)tar-devel-1.2.20-9.2.mga8 from SRPM: libtar-1.2.20-9.2.mga8.src.rpm Assignee:
pkg-bugs =>
qa-bugs MGA8-64 MATE on Acer Aspire 5253 No installation issues. Re-using the test files from bug 30821. $ cd libtartest/ $ libtar -c tartest.tar test.txt $ rm -f test.txt $ libtar -x tartest.tar $ cat test.txt test test test So testing is OK. Whiteboard:
(none) =>
MGA8-64-OK Validating. Advisory in comment 2. CC:
(none) =>
andrewsfarm, sysadmin-bugs
Dave Hodgins
2022-12-30 21:45:26 CET
CC:
(none) =>
davidwhodgins An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2022-0488.html Status:
ASSIGNED =>
RESOLVED |