OpenPKG CVS Repository http://cvs.openpkg.org/ ____________________________________________________________________________
Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /v/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-web Date: 05-Mar-2006 20:08:10 Branch: HEAD Handle: 2006030519080900 Added files: openpkg-web/security OpenPKG-SA-2006.006-tar.txt Log: release OpenPKG Security Advisory 2006.006 (tar) Summary: Revision Changes Path 1.1 +51 -0 openpkg-web/security/OpenPKG-SA-2006.006-tar.txt ____________________________________________________________________________ patch -p0 <<'@@ .' Index: openpkg-web/security/OpenPKG-SA-2006.006-tar.txt ============================================================================ $ cvs diff -u -r0 -r1.1 OpenPKG-SA-2006.006-tar.txt --- /dev/null 2006-03-05 20:08:06 +0100 +++ OpenPKG-SA-2006.006-tar.txt 2006-03-05 20:08:10 +0100 @@ -0,0 +1,51 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA1 + +________________________________________________________________________ + +OpenPKG Security Advisory The OpenPKG Project +http://www.openpkg.org/security.html http://www.openpkg.org [EMAIL PROTECTED] [EMAIL PROTECTED] +OpenPKG-SA-2006.006 05-Mar-2006 +________________________________________________________________________ + +Package: tar +Vulnerability: crazy tar vulnerability +OpenPKG Specific: no + +Affected Releases: Affected Packages: Corrected Packages: +OpenPKG CURRENT <= tar-1.15.1-20050131 >= tar-1.15.1-20060305 +OpenPKG 2.5 <= tar-1.15.1-2.5.0 >= tar-1.15.1-2.5.1 +OpenPKG 2.4 <= tar-1.15.1-2.4.0 >= tar-1.15.1-2.4.1 +OpenPKG 2.3 <= tar-1.15.1-2.3.0 >= tar-1.15.1-2.3.1 + +Description: + According to a bug report from Jim Meyering [0], a remote overflow + exists in the GNU Tape Archiver (Tar). GNU Tar fails to properly + handle PAX extended headers resulting in a buffer overflow. With a + specially crafted Tar format archive, an attacker can cause arbitrary + command execution when the victim lists the Tar contents or extracts + the archive. The Common Vulnerabilities and Exposures (CVE) project + assigned the id CVE-2006-0300 [2] to the problem. +________________________________________________________________________ + +References: + [0] http://lists.gnu.org/archive/html/bug-tar/2005-06/msg00029.html + [1] http://www.gnu.org/software/tar/ + [2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0300 +________________________________________________________________________ + +For security reasons, this advisory was digitally signed with the +OpenPGP public key "OpenPKG <[EMAIL PROTECTED]>" (ID 63C4CB9F) of the +OpenPKG project which you can retrieve from http://pgp.openpkg.org and +hkp://pgp.openpkg.org. Follow the instructions on http://pgp.openpkg.org/ +for details on how to verify the integrity of this advisory. +________________________________________________________________________ + +-----BEGIN PGP SIGNATURE----- +Comment: OpenPKG <[EMAIL PROTECTED]> + +iD8DBQFECzaVgHWT4GPEy58RAqIPAJ97xcRXBoVoXyoTVPMfsb9J7+CgPgCg8ToY +hrKJzn82bsrojmCfVloN/eM= +=nL44 +-----END PGP SIGNATURE----- @@ . ______________________________________________________________________ The OpenPKG Project www.openpkg.org CVS Repository Commit List openpkg-cvs@openpkg.org