First published: Fri Dec 09 2016(Updated: )
Directory traversal vulnerability in the safer_name_suffix function in GNU tar 1.14 through 1.29 might allow remote attackers to bypass an intended protection mechanism and write to arbitrary files via vectors related to improper sanitization of the file_name parameter, aka POINTYFEATHER.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
GNU tar | =1.14 | |
GNU tar | =1.15 | |
GNU tar | =1.15.1 | |
GNU tar | =1.15.90 | |
GNU tar | =1.15.91 | |
GNU tar | =1.16 | |
GNU tar | =1.16.1 | |
GNU tar | =1.17 | |
GNU tar | =1.18 | |
GNU tar | =1.19 | |
GNU tar | =1.20 | |
GNU tar | =1.21 | |
GNU tar | =1.22 | |
GNU tar | =1.23 | |
GNU tar | =1.24 | |
GNU tar | =1.25 | |
GNU tar | =1.26 | |
GNU tar | =1.27 | |
GNU tar | =1.27.1 | |
GNU tar | =1.28 | |
GNU tar | =1.29 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.