ALT-BU-2025-5367-1
Branch c9f2 update bulletin.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2013-4420
Multiple directory traversal vulnerabilities in the (1) tar_extract_glob and (2) tar_extract_all functions in libtar 1.2.20 and earlier allow remote attackers to overwrite arbitrary files via a .. (dot dot) in a crafted tar file.
Modified: 2025-04-02
CVE-2021-33643
An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longlink, causing an out-of-bounds read.
- FEDORA-2022-88772d0a2d
- FEDORA-2022-88772d0a2d
- FEDORA-2022-fe1a4e3cf0
- FEDORA-2022-fe1a4e3cf0
- FEDORA-2022-44a20bba43
- FEDORA-2022-44a20bba43
- FEDORA-2022-ccc68b06cc
- FEDORA-2022-ccc68b06cc
- FEDORA-2022-50e8a1b51d
- FEDORA-2022-50e8a1b51d
- https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1807
- https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1807
Modified: 2025-04-02
CVE-2021-33644
An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longname, causing an out-of-bounds read.
- FEDORA-2022-88772d0a2d
- FEDORA-2022-88772d0a2d
- FEDORA-2022-fe1a4e3cf0
- FEDORA-2022-fe1a4e3cf0
- FEDORA-2022-44a20bba43
- FEDORA-2022-44a20bba43
- FEDORA-2022-ccc68b06cc
- FEDORA-2022-ccc68b06cc
- FEDORA-2022-50e8a1b51d
- FEDORA-2022-50e8a1b51d
- https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1807
- https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1807
Modified: 2025-04-02
CVE-2021-33645
The th_read() function doesn’t free a variable t->th_buf.gnu_longlink after allocating memory, which may cause a memory leak.
- FEDORA-2022-88772d0a2d
- FEDORA-2022-88772d0a2d
- FEDORA-2022-fe1a4e3cf0
- FEDORA-2022-fe1a4e3cf0
- FEDORA-2022-44a20bba43
- FEDORA-2022-44a20bba43
- FEDORA-2022-ccc68b06cc
- FEDORA-2022-ccc68b06cc
- FEDORA-2022-50e8a1b51d
- FEDORA-2022-50e8a1b51d
- https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1807
- https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1807
Modified: 2025-04-02
CVE-2021-33646
The th_read() function doesn’t free a variable t->th_buf.gnu_longname after allocating memory, which may cause a memory leak.
- FEDORA-2022-88772d0a2d
- FEDORA-2022-88772d0a2d
- FEDORA-2022-fe1a4e3cf0
- FEDORA-2022-fe1a4e3cf0
- FEDORA-2022-44a20bba43
- FEDORA-2022-44a20bba43
- FEDORA-2022-ccc68b06cc
- FEDORA-2022-ccc68b06cc
- FEDORA-2022-50e8a1b51d
- FEDORA-2022-50e8a1b51d
- https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1807
- https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1807
Closed vulnerabilities
BDU:2024-10643
Уязвимость серверного программного обеспечения HAProxy, связанная с недостатками обработки HTTP-запросов, позволяющая нарушителю обойти ограничения безопасности и отправить скрытый HTTP-запрос (атака типа HTTP Request Smuggling)
CVE-2024-53008
Inconsistent interpretation of HTTP requests ('HTTP Request/Response Smuggling') issue exists in HAProxy. If this vulnerability is exploited, a remote attacker may access a path that is restricted by ACL (Access Control List) set on the product. As a result, the attacker may obtain sensitive information.
- https://git.haproxy.org/?p=haproxy-2.6.git;a=commit;h=1afca10150ac3e4e2224055cc31b6f1e4a70efe2
- https://git.haproxy.org/?p=haproxy-2.8.git;a=commit;h=01c1056a44823c5ffb8f74660b32c099d9b5355b
- https://git.haproxy.org/?p=haproxy-2.9.git;a=commit;h=4bcaece344c8738dac1ab5bd8cc81e2a22701d71
- https://git.haproxy.org/?p=haproxy-3.0.git;a=commit;h=95a607c4b3af09be2a495b9c2872ea252ccff603
- https://jvn.jp/en/jp/JVN88385716/
- https://www.haproxy.org/