{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2021-33645","assignerOrgId":"7e1ac599-2767-43fa-b3ea-f10178cc98f2","assignerShortName":"openEuler","dateUpdated":"2025-11-03T20:33:38.619Z","dateReserved":"2021-05-28T00:00:00.000Z","datePublished":"2022-08-09T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"7e1ac599-2767-43fa-b3ea-f10178cc98f2","shortName":"openEuler","dateUpdated":"2022-12-28T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"The th_read() function doesn’t free a variable t->th_buf.gnu_longlink after allocating memory, which may cause a memory leak."}],"affected":[{"vendor":"n/a","product":"libtar","versions":[{"version":"<1.2.21","status":"affected"}]}],"references":[{"url":"https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1807"},{"name":"FEDORA-2022-fe1a4e3cf0","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5YSHZY753R7XW6CIKJVAWI373WW3YRRJ/"},{"name":"FEDORA-2022-50e8a1b51d","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OD4HEBSTI22FNYKOKK7W3X6ZQE6FV3XC/"},{"name":"FEDORA-2022-44a20bba43","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7Q26QDNOJDOFYWMJWEIK5XR62M2FF6IJ/"},{"name":"FEDORA-2022-88772d0a2d","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4S4PJRCJLEAWN2EKXGLSOBTL7O57V7NC/"},{"name":"FEDORA-2022-ccc68b06cc","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WX5YE66CT7Y5C2HTHXSFDKQWYWYWJ2T/"}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-401: Missing Release of Memory after Effective Lifetime","cweId":"CWE-401"}]}]},"adp":[{"title":"CVE Program Container","references":[{"url":"https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1807","tags":["x_transferred"]},{"name":"FEDORA-2022-fe1a4e3cf0","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5YSHZY753R7XW6CIKJVAWI373WW3YRRJ/"},{"name":"FEDORA-2022-50e8a1b51d","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OD4HEBSTI22FNYKOKK7W3X6ZQE6FV3XC/"},{"name":"FEDORA-2022-44a20bba43","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7Q26QDNOJDOFYWMJWEIK5XR62M2FF6IJ/"},{"name":"FEDORA-2022-88772d0a2d","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4S4PJRCJLEAWN2EKXGLSOBTL7O57V7NC/"},{"name":"FEDORA-2022-ccc68b06cc","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WX5YE66CT7Y5C2HTHXSFDKQWYWYWJ2T/"},{"url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00026.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T20:33:38.619Z"}}]}}