Debians sikkerhedsbulletin
DSA-1438-1 tar -- flere sårbarheder
- Rapporteret den:
- 28. dec 2007
- Berørte pakker:
- tar
- Sårbar:
- Ja
- Referencer i sikkerhedsdatabaser:
- I Mitres CVE-ordbog: CVE-2007-4131, CVE-2007-4476.
- Yderligere oplysninger:
-
Flere sårbarheder er opdaget i GNU Tar. Projektet Common Vulnerabilities og Exposures har fundet frem til følgende problemer:
- CVE-2007-4131
En mappegennemløbssårbarhed gjorde det muligt for angribere med særligt fremstillede arkiver at udpakke indhold uden for mappetræet oprettet af tar.
- CVE-2007-4476
Et stakbaseret bufferoverløb i koden til kontrol af filnavne, kunne føre til udførelse af vilkårlig kode når ondsindet fremstillede arkiver blev behandlet.
I den gamle stabile distribution (sarge), er disse problemer rettet i version 1.14-2.4.
I den stabile distribution (etch), er disse problemer rettet i version 1.16-2etch1.
I den ustabile distribution (sid), er disse problemer rettet i version 1.18-2.
Vi anbefaler at du opgraderer din tar-pakke.
- CVE-2007-4131
- Rettet i:
-
Debian GNU/Linux 3.1 (oldstable)
- Kildekode:
- http://security.debian.org/pool/updates/main/t/tar/tar_1.14.orig.tar.gz
- http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4.dsc
- http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4.diff.gz
- http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4.dsc
- Alpha:
- http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4_alpha.deb
- AMD64:
- http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4_amd64.deb
- ARM:
- http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4_arm.deb
- HP Precision:
- http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4_hppa.deb
- Intel IA-32:
- http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4_i386.deb
- Intel IA-64:
- http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4_ia64.deb
- Motorola 680x0:
- http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4_m68k.deb
- Big-endian MIPS:
- http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4_mips.deb
- Little-endian MIPS:
- http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4_mipsel.deb
- PowerPC:
- http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4_powerpc.deb
- IBM S/390:
- http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4_s390.deb
- Sun Sparc:
- http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4_sparc.deb
Debian GNU/Linux 4.0 (stable)
- Kildekode:
- http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1.diff.gz
- http://security.debian.org/pool/updates/main/t/tar/tar_1.16.orig.tar.gz
- http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1.dsc
- http://security.debian.org/pool/updates/main/t/tar/tar_1.16.orig.tar.gz
- Alpha:
- http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1_alpha.deb
- AMD64:
- http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1_amd64.deb
- ARM:
- http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1_arm.deb
- HP Precision:
- http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1_hppa.deb
- Intel IA-32:
- http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1_i386.deb
- Intel IA-64:
- http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1_ia64.deb
- Big-endian MIPS:
- http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1_mips.deb
- Little-endian MIPS:
- http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1_mipsel.deb
- PowerPC:
- http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1_powerpc.deb
- IBM S/390:
- http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1_s390.deb
- Sun Sparc:
- http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1_sparc.deb
MD5-kontrolsummer for de listede filer findes i den originale sikkerhedsbulletin.