First published: Fri Aug 17 2007(Updated: )
Buffer overflow in the safer_name_suffix function in GNU tar has unspecified attack vectors and impact, resulting in a "crashing stack."
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
GNU tar | <1.19 | |
Debian Debian Linux | =3.1 | |
Debian Debian Linux | =4.0 | |
Canonical Ubuntu Linux | =7.04 | |
Canonical Ubuntu Linux | =7.10 | |
Canonical Ubuntu Linux | =6.06 | |
redhat/tar | <0:1.14-13.el4_8.1 | 0:1.14-13.el4_8.1 |
redhat/tar | <2:1.15.1-23.0.1.el5_4.2 | 2:1.15.1-23.0.1.el5_4.2 |
redhat/cpio | <0:2.6-23.el5_4.1 | 0:2.6-23.el5_4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.