TencentOS Server 3: libtar (TSSA-2023:0136)

high Nessus Plugin ID 239260

Synopsis

The remote TencentOS Server 3 host is missing one or more security updates.

Description

The version of Tencent Linux installed on the remote TencentOS Server 3 host is prior to tested version. It is, therefore, affected by multiple vulnerabilities as referenced in the TSSA-2023:0136 advisory.

Package updates are available for TencentOS Server 3 that fix the following vulnerabilities:

CVE-2021-33640:
After tar_close(), libtar.c releases the memory pointed to by pointer t. After tar_close() is called in the list() function, it continues to use pointer t: free_longlink_longname(t->th_buf) . As a result, the released memory is used (use-after-free).
CVE-2021-33645:
A flaw was found in libtar. This security vulnerability occurs because the th_read() function in libtar doesn't free a variable t->th_buf.gnu_longlink after allocating memory, which may cause a memory leak.

CVE-2021-33646:
A flaw was found in libtar. This security vulnerability occurs because the th_read() function in libtar doesn't free a variable t->th_buf.gnu_longname after allocating memory, which may cause a memory leak.

CVE-2021-33643:
A flaw was found in libtar. This flaw allows an attacker who submits a crafted tar file with the size in the header struct being 0 to trigger a calling of malloc(0) for a variable gnu_longlink, causing an out- of-bounds read.

CVE-2021-33644:
A flaw was found in libtar. This flaw allows an attacker who submits a crafted tar file with size in header struct being 0 to trigger a calling of malloc(0) for a variable gnu_longname, causing an out-of- bounds read.

Tenable has extracted the preceding description block directly from the Tencent Linux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://mirrors.tencent.com/tlinux/errata/tssa-20230136.xml

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33640

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33645

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33646

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33643

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33644

Plugin Details

Severity: High

ID: 239260

File Name: tencentos_TSSA_2023_0136.nasl

Version: 1.1

Type: local

Published: 6/16/2025

Updated: 6/16/2025

Supported Sensors: Nessus

Vulnerability Information

CPE: cpe:/o:tencent:tencentos_server:3, p-cpe:/a:tencent:tencentos_server:libtar

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/etc/os-release, Host/TencentOS/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 7/13/2023

Vulnerability Publication Date: 7/13/2023