An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longlink, causing an out-of-bounds read.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
03 Nov 2025, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
02 Apr 2025, 18:33
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:huawei:openeuler:22.03:*:*:*:lts:*:*:* cpe:2.3:o:huawei:openeuler:20.03:sp1:*:*:lts:*:*:* |
cpe:2.3:o:openatom:openeuler:20.03:sp3:*:*:lts:*:*:* cpe:2.3:o:openatom:openeuler:22.03:*:*:*:lts:*:*:* cpe:2.3:o:openatom:openeuler:20.03:sp1:*:*:lts:*:*:* |
| First Time |
Openatom openeuler
Openatom |
Information
Published : 2022-08-10 20:15
Updated : 2025-11-03 21:15
NVD link : CVE-2021-33643
Mitre link : CVE-2021-33643
CVE.ORG link : CVE-2021-33643
JSON object : View
Products Affected
fedoraproject
- fedora
feep
- libtar
openatom
- openeuler
CWE
CWE-125
Out-of-bounds Read
