CVE-2007-4476
Published: 5 September 2007
Buffer overflow in the safer_name_suffix function in GNU tar has unspecified attack vectors and impact, resulting in a "crashing stack."
Priority
Status
Package | Release | Status |
---|---|---|
cpio Launchpad, Ubuntu, Debian |
dapper |
Released
(2.6-10ubuntu0.3)
|
edgy |
Needed
(reached end-of-life)
|
|
feisty |
Released
(2.6-17ubuntu0.7.04.1)
|
|
gutsy |
Released
(2.8-1ubuntu2.2)
|
|
hardy |
Not vulnerable
(2.9-6ubuntu1)
|
|
intrepid |
Not vulnerable
(2.9-13ubuntu1)
|
|
upstream |
Released
(2.9-5)
|
|
tar Launchpad, Ubuntu, Debian |
dapper |
Released
(1.15.1-2ubuntu2.3)
|
edgy |
Needed
(reached end-of-life)
|
|
feisty |
Needed
(reached end-of-life)
|
|
gutsy |
Released
(1.18-2ubuntu1.1)
|
|
hardy |
Not vulnerable
|
|
intrepid |
Not vulnerable
|
|
upstream |
Released
(1.18-2)
|
Notes
Author | Note |
---|---|
jdstrand | 1.19 has the fixes, 1.18 as included in Gutsy does not |
References
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=441444
- https://bugzilla.redhat.com/show_bug.cgi?id=280961
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4476
- https://ubuntu.com/security/notices/USN-650-1
- https://ubuntu.com/security/notices/USN-709-1
- NVD
- Launchpad
- Debian