Bug 181773 - CVE-2006-0300 GNU tar heap overlfow bug
Summary: CVE-2006-0300 GNU tar heap overlfow bug
Status: CLOSED CURRENTRELEASE
Alias: None
Product: Fedora
Classification: Fedora
Component: tar
Version: 4
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Peter Vrabec
QA Contact: Ben Levenson
URL:
Whiteboard: impact=moderate,source=redhat,reporte...
Keywords: Security
: 182404 (view as bug list)
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2006-02-16 14:17 UTC by Josh Bressers
Modified: 2007-11-30 22:11 UTC (History)
2 users (show)

(edit)
Clone Of:
(edit)
Last Closed: 2006-03-03 08:46:00 UTC


Attachments (Terms of Use)

Description Josh Bressers 2006-02-16 14:17:29 UTC
+++ This bug was initially created as a clone of Bug #181772 +++

Jim Meyering discovered and silently fixed a buffer overflow bug in GNU
tar.  It looks exploitable.  There is a public mail message about it here:
http://lists.gnu.org/archive/html/bug-tar/2005-06/msg00029.html

My limited testing has shown this issue to only affect tar versions 1.14
and above.

Upstream has asked we not announce this issue until they release an update.

-- Additional comment from bressers@redhat.com on 2006-02-16 09:11 EST --
Created an attachment (id=124746)
Patch extracted from upstream CVS


-- Additional comment from bressers@redhat.com on 2006-02-16 09:13 EST --
Created an attachment (id=124747)
Testcase generator from Jim

Comment 1 Peter Vrabec 2006-02-22 13:42:38 UTC
*** Bug 182404 has been marked as a duplicate of this bug. ***

Comment 2 Mark J. Cox 2006-02-24 09:34:25 UTC
remove embargo, fix at will

Comment 3 Peter Vrabec 2006-03-03 08:46:00 UTC
fixed in update id #114 tar-1.15.1-12.FC4 and 
devel too

Comment 4 hkoba 2006-04-20 12:26:56 UTC
BTW, when tar-1.15.1-12.FC4 will be released ;-)
I can't find it in master server:

% curl -s http://download.fedora.redhat.com/pub/fedora/linux/core/updates/4/i386/|
perl -nle '/href="(tar-[^"]+)/ and print $1'
tar-1.15.1-11.FC4.i386.rpm



Note You need to log in before you can comment on or make changes to this bug.