lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Wed Feb 22 02:11:07 2006
From: security at mandriva.com (security@...driva.com)
Subject: [ MDKSA-2006:046 ] - Updated tar packages fix
	vulnerability


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDKSA-2006:046
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : tar
 Date    : February 21, 2006
 Affected: 10.1, 10.2, 2006.0
 _______________________________________________________________________
 
 Problem Description:
 
 Gnu tar versions 1.14 and above have a buffer overflow vulnerability
 and some other issues including:
 
 - Carefully crafted invalid headers can cause buffer overrun.
 - Invalid header fields go undiagnosed.
 - Some valid time strings are ignored.
 
 The updated packages have been patched to address this issue.
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0300
 _______________________________________________________________________
 
 Updated Packages:
 
 Mandriva Linux 10.1:
 8bd49b5e60e1736e771e3907789e37bb  10.1/RPMS/tar-1.14-1.1.101mdk.i586.rpm
 57dc0115bfe997451de8d05375785395  10.1/SRPMS/tar-1.14-1.1.101mdk.src.rpm

 Mandriva Linux 10.1/X86_64:
 c4ad8f0250fef5da4ba2f9097c6190e2  x86_64/10.1/RPMS/tar-1.14-1.1.101mdk.x86_64.rpm
 57dc0115bfe997451de8d05375785395  x86_64/10.1/SRPMS/tar-1.14-1.1.101mdk.src.rpm

 Mandriva Linux 10.2:
 91ad7217d416f4d07536a08c6762fd8d  10.2/RPMS/tar-1.15.1-2.1.102mdk.i586.rpm
 efd8210667f158419143b243c1ee01d7  10.2/SRPMS/tar-1.15.1-2.1.102mdk.src.rpm

 Mandriva Linux 10.2/X86_64:
 edc3e1b3eec8c5f52aa29c6f7351f563  x86_64/10.2/RPMS/tar-1.15.1-2.1.102mdk.x86_64.rpm
 efd8210667f158419143b243c1ee01d7  x86_64/10.2/SRPMS/tar-1.15.1-2.1.102mdk.src.rpm

 Mandriva Linux 2006.0:
 5300c6bc1aa290f2a8efffff2b3e8b27  2006.0/RPMS/tar-1.15.1-5.1.20060mdk.i586.rpm
 275c24b2288e5b9c57d5a1bdef4798ad  2006.0/SRPMS/tar-1.15.1-5.1.20060mdk.src.rpm

 Mandriva Linux 2006.0/X86_64:
 2c7378971d6b87fad153b8667e800b00  x86_64/2006.0/RPMS/tar-1.15.1-5.1.20060mdk.x86_64.rpm
 275c24b2288e5b9c57d5a1bdef4798ad  x86_64/2006.0/SRPMS/tar-1.15.1-5.1.20060mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFD+5sZmqjQ0CJFipgRAg/qAJ9e8t86QPJZ1tOOqhbJ3ED0Q7Q7MACfRqNH
WeJC8+PLyJG2psgFmTYak7A=
=Zc9A
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists