To: [email protected]Subject: [ MDKSA-2006:046 ] - Updated tar packages fix vulnerability
Date: Tue, 21 Feb 2006 19:11:00 -0700
From: [email protected]
Reply-To: <xsecurity@mandriva.com.>
Message-Id: <E1FBjT2-0000cG-C8@mercury.mandriva.com.>
Sender: QATeam User <qateam@mercury.mandriva.com.>
X-Virus-Scanned: antivirus-gw at tyumen.ru
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDKSA-2006:046
http://www.mandriva.com/security/
_______________________________________________________________________
Package : tar
Date : February 21, 2006
Affected: 10.1, 10.2, 2006.0
_______________________________________________________________________
Problem Description:
Gnu tar versions 1.14 and above have a buffer overflow vulnerability
and some other issues including:
- Carefully crafted invalid headers can cause buffer overrun.
- Invalid header fields go undiagnosed.
- Some valid time strings are ignored.
The updated packages have been patched to address this issue.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0300
_______________________________________________________________________
Updated Packages:
Mandriva Linux 10.1:
8bd49b5e60e1736e771e3907789e37bb 10.1/RPMS/tar-1.14-1.1.101mdk.i586.rpm
57dc0115bfe997451de8d05375785395 10.1/SRPMS/tar-1.14-1.1.101mdk.src.rpm
Mandriva Linux 10.1/X86_64:
c4ad8f0250fef5da4ba2f9097c6190e2 x86_64/10.1/RPMS/tar-1.14-1.1.101mdk.x86_64.rpm
57dc0115bfe997451de8d05375785395 x86_64/10.1/SRPMS/tar-1.14-1.1.101mdk.src.rpm
Mandriva Linux 10.2:
91ad7217d416f4d07536a08c6762fd8d 10.2/RPMS/tar-1.15.1-2.1.102mdk.i586.rpm
efd8210667f158419143b243c1ee01d7 10.2/SRPMS/tar-1.15.1-2.1.102mdk.src.rpm
Mandriva Linux 10.2/X86_64:
edc3e1b3eec8c5f52aa29c6f7351f563 x86_64/10.2/RPMS/tar-1.15.1-2.1.102mdk.x86_64.rpm
efd8210667f158419143b243c1ee01d7 x86_64/10.2/SRPMS/tar-1.15.1-2.1.102mdk.src.rpm
Mandriva Linux 2006.0:
5300c6bc1aa290f2a8efffff2b3e8b27 2006.0/RPMS/tar-1.15.1-5.1.20060mdk.i586.rpm
275c24b2288e5b9c57d5a1bdef4798ad 2006.0/SRPMS/tar-1.15.1-5.1.20060mdk.src.rpm
Mandriva Linux 2006.0/X86_64:
2c7378971d6b87fad153b8667e800b00 x86_64/2006.0/RPMS/tar-1.15.1-5.1.20060mdk.x86_64.rpm
275c24b2288e5b9c57d5a1bdef4798ad x86_64/2006.0/SRPMS/tar-1.15.1-5.1.20060mdk.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)
iD8DBQFD+5sZmqjQ0CJFipgRAg/qAJ9e8t86QPJZ1tOOqhbJ3ED0Q7Q7MACfRqNH
WeJC8+PLyJG2psgFmTYak7A=
=Zc9A
-----END PGP SIGNATURE-----