Debians sikkerhedsbulletin

DSA-1438-1 tar -- flere sårbarheder

Rapporteret den:
28. dec 2007
Berørte pakker:
tar
Sårbar:
Ja
Referencer i sikkerhedsdatabaser:
I Mitres CVE-ordbog: CVE-2007-4131, CVE-2007-4476.
Yderligere oplysninger:

Flere sårbarheder er opdaget i GNU Tar. Projektet Common Vulnerabilities og Exposures har fundet frem til følgende problemer:

  • CVE-2007-4131

    En mappegennemløbssårbarhed gjorde det muligt for angribere med særligt fremstillede arkiver at udpakke indhold uden for mappetræet oprettet af tar.

  • CVE-2007-4476

    Et stakbaseret bufferoverløb i koden til kontrol af filnavne, kunne føre til udførelse af vilkårlig kode når ondsindet fremstillede arkiver blev behandlet.

I den gamle stabile distribution (sarge), er disse problemer rettet i version 1.14-2.4.

I den stabile distribution (etch), er disse problemer rettet i version 1.16-2etch1.

I den ustabile distribution (sid), er disse problemer rettet i version 1.18-2.

Vi anbefaler at du opgraderer din tar-pakke.

Rettet i:

Debian GNU/Linux 3.1 (oldstable)

Kildekode:
http://security.debian.org/pool/updates/main/t/tar/tar_1.14.orig.tar.gz
http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4.dsc
http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4.diff.gz
Alpha:
http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4_alpha.deb
AMD64:
http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4_amd64.deb
ARM:
http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4_arm.deb
HP Precision:
http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4_hppa.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4_ia64.deb
Motorola 680x0:
http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4_m68k.deb
Big-endian MIPS:
http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4_mips.deb
Little-endian MIPS:
http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4_mipsel.deb
PowerPC:
http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4_s390.deb
Sun Sparc:
http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4_sparc.deb

Debian GNU/Linux 4.0 (stable)

Kildekode:
http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1.diff.gz
http://security.debian.org/pool/updates/main/t/tar/tar_1.16.orig.tar.gz
http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1.dsc
Alpha:
http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1_alpha.deb
AMD64:
http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1_amd64.deb
ARM:
http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1_arm.deb
HP Precision:
http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1_hppa.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1_ia64.deb
Big-endian MIPS:
http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1_mips.deb
Little-endian MIPS:
http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1_mipsel.deb
PowerPC:
http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1_s390.deb
Sun Sparc:
http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1_sparc.deb

MD5-kontrolsummer for de listede filer findes i den originale sikkerhedsbulletin.