what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Red Hat Security Advisory 2023-2898-01

Red Hat Security Advisory 2023-2898-01
Posted May 16, 2023
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2023-2898-01 - The libtar packages contain a C library for manipulating tar archives. The library supports both the strict POSIX tar format and many of the commonly used GNU extensions. Issues addressed include memory leak and out of bounds read vulnerabilities.

tags | advisory, vulnerability, memory leak
systems | linux, redhat, osx
advisories | CVE-2021-33643, CVE-2021-33644, CVE-2021-33645, CVE-2021-33646
SHA-256 | 7f829d5c46558d34b8e0966a6bbdb5512e0f0d8629e4740cf5754cbf01d65479

Red Hat Security Advisory 2023-2898-01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Moderate: libtar security update
Advisory ID: RHSA-2023:2898-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2023:2898
Issue date: 2023-05-16
CVE Names: CVE-2021-33643 CVE-2021-33644 CVE-2021-33645
CVE-2021-33646
====================================================================
1. Summary:

An update for libtar is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AppStream (v. 8) - aarch64, ppc64le, s390x, x86_64

3. Description:

The libtar packages contain a C library for manipulating tar archives. The
library supports both the strict POSIX tar format and many of the commonly
used GNU extensions.

Security Fix(es):

* libtar: out-of-bounds read in gnu_longlink (CVE-2021-33643)

* libtar: out-of-bounds read in gnu_longname (CVE-2021-33644)

* libtar: memory leak found in th_read() function (CVE-2021-33645)

* libtar: memory leak found in th_read() function (CVE-2021-33646)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat
Enterprise Linux 8.8 Release Notes linked from the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

2121289 - CVE-2021-33643 libtar: out-of-bounds read in gnu_longlink
2121292 - CVE-2021-33644 libtar: out-of-bounds read in gnu_longname
2121295 - CVE-2021-33645 libtar: memory leak found in th_read() function
2121297 - CVE-2021-33646 libtar: memory leak found in th_read() function

6. Package List:

Red Hat Enterprise Linux AppStream (v. 8):

Source:
libtar-1.2.20-17.el8.src.rpm

aarch64:
libtar-1.2.20-17.el8.aarch64.rpm
libtar-debuginfo-1.2.20-17.el8.aarch64.rpm
libtar-debugsource-1.2.20-17.el8.aarch64.rpm

ppc64le:
libtar-1.2.20-17.el8.ppc64le.rpm
libtar-debuginfo-1.2.20-17.el8.ppc64le.rpm
libtar-debugsource-1.2.20-17.el8.ppc64le.rpm

s390x:
libtar-1.2.20-17.el8.s390x.rpm
libtar-debuginfo-1.2.20-17.el8.s390x.rpm
libtar-debugsource-1.2.20-17.el8.s390x.rpm

x86_64:
libtar-1.2.20-17.el8.i686.rpm
libtar-1.2.20-17.el8.x86_64.rpm
libtar-debuginfo-1.2.20-17.el8.i686.rpm
libtar-debuginfo-1.2.20-17.el8.x86_64.rpm
libtar-debugsource-1.2.20-17.el8.i686.rpm
libtar-debugsource-1.2.20-17.el8.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2021-33643
https://access.redhat.com/security/cve/CVE-2021-33644
https://access.redhat.com/security/cve/CVE-2021-33645
https://access.redhat.com/security/cve/CVE-2021-33646
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.8_release_notes/index

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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I+bk
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce
Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    53 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close