First published: Thu Sep 06 2007(Updated: )
Common Vulnerabilities and Exposures assigned an identifier <a href="https://access.redhat.com/security/cve/CVE-2007-4476">CVE-2007-4476</a> to the following vulnerability: Bug in the safer_name_suffix function in GNU tar may lead to a "crashing stack". It can be used to crash tar while extracting archive containing file with long name containing unsafe prefix. Affected function is also part of cpio source code. References: <a href="http://www.novell.com/linux/security/advisories/2007_18_sr.html">http://www.novell.com/linux/security/advisories/2007_18_sr.html</a> <a href="http://lists.gnu.org/archive/html/bug-cpio/2007-08/msg00002.html">http://lists.gnu.org/archive/html/bug-cpio/2007-08/msg00002.html</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu tar | ||
GNU Cpio |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-280961 is considered moderate, as it can lead to crashes in the GNU tar application.
To fix REDHAT-BUG-280961, ensure you are using the latest version of GNU tar or apply the recommended patches provided by your distribution.
The impact of REDHAT-BUG-280961 is that it can cause the GNU tar application to crash during the extraction of certain tar files.
REDHAT-BUG-280961 affects GNU tar and GNU cpio, potentially leading to application crashes.
A potential workaround for REDHAT-BUG-280961 is to avoid extracting tar files from untrusted sources until the vulnerability is resolved.