Login
Newsletter
Werbung

Sicherheit: Überschreiben von Dateien in tar
Aktuelle Meldungen Distributionen
Name: Überschreiben von Dateien in tar
ID: USN-385-1
Distribution: Ubuntu
Plattformen: Ubuntu 5.10, Ubuntu 6.06, Ubuntu 6.10
Datum: Di, 28. November 2006, 00:42
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6097
Applikationen: GNU Tar

Originalnachricht


--===============1091247954==
Content-Type: multipart/signed; micalg=pgp-sha1;
protocol="application/pgp-signature";
boundary="xB0nW4MQa6jZONgY"
Content-Disposition: inline


--xB0nW4MQa6jZONgY
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

===========================================================
Ubuntu Security Notice USN-385-1 November 27, 2006
tar vulnerability
CVE-2006-6097
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 5.10
Ubuntu 6.06 LTS
Ubuntu 6.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.10:
tar 1.15.1-2ubuntu0.2

Ubuntu 6.06 LTS:
tar 1.15.1-2ubuntu2.1

Ubuntu 6.10:
tar 1.15.91-2ubuntu0.3

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

Teemu Salmela discovered that tar still handled the deprecated
GNUTYPE_NAMES record type. This record type could be used to create
symlinks that would be followed while unpacking a tar archive. If a
user or an automated system were tricked into unpacking a specially
crafted tar file, arbitrary files could be overwritten with user
privileges.


Updated packages for Ubuntu 5.10:

Source archives:

http://security.ubuntu.com/ubuntu/pool/main/t/tar/tar_1.15.1-2ubuntu0.2=
=2Ediff.gz
Size/MD5: 29654 155f4628f9fef19aa20e3927a857fd0d
http://security.ubuntu.com/ubuntu/pool/main/t/tar/tar_1.15.1-2ubuntu0.2=
=2Edsc
Size/MD5: 574 22006def60be25510613a955ca7e90d2
http://security.ubuntu.com/ubuntu/pool/main/t/tar/tar_1.15.1.orig.tar.gz
Size/MD5: 2204322 d87021366fe6488e9dc398fcdcb6ed7d

amd64 architecture (Athlon64, Opteron, EM64T Xeon)

http://security.ubuntu.com/ubuntu/pool/main/t/tar/tar_1.15.1-2ubuntu0.2=
_amd64.deb
Size/MD5: 531932 d507bfc76276c9cc43ebf56f9d69038a

i386 architecture (x86 compatible Intel/AMD)

http://security.ubuntu.com/ubuntu/pool/main/t/tar/tar_1.15.1-2ubuntu0.2=
_i386.deb
Size/MD5: 519858 ed19ee38f074d841366737e880a5c626

powerpc architecture (Apple Macintosh G3/G4/G5)

http://security.ubuntu.com/ubuntu/pool/main/t/tar/tar_1.15.1-2ubuntu0.2=
_powerpc.deb
Size/MD5: 533886 5d0d477d0bbe5589f5a3181144099c92

sparc architecture (Sun SPARC/UltraSPARC)

http://security.ubuntu.com/ubuntu/pool/main/t/tar/tar_1.15.1-2ubuntu0.2=
_sparc.deb
Size/MD5: 525056 1fa9aa25fbbc81c4fcf767c28b4eb991

Updated packages for Ubuntu 6.06 LTS:

Source archives:

http://security.ubuntu.com/ubuntu/pool/main/t/tar/tar_1.15.1-2ubuntu2.1=
=2Ediff.gz
Size/MD5: 30078 32b5ca833a90aa5bcbc3941a07dbf81a
http://security.ubuntu.com/ubuntu/pool/main/t/tar/tar_1.15.1-2ubuntu2.1=
=2Edsc
Size/MD5: 574 c68c40e5d79b9afd13626694b0bcb2d4
http://security.ubuntu.com/ubuntu/pool/main/t/tar/tar_1.15.1.orig.tar.gz
Size/MD5: 2204322 d87021366fe6488e9dc398fcdcb6ed7d

amd64 architecture (Athlon64, Opteron, EM64T Xeon)

http://security.ubuntu.com/ubuntu/pool/main/t/tar/tar_1.15.1-2ubuntu2.1=
_amd64.deb
Size/MD5: 532022 ddcb1e2e8770645f683b462b095ff851

i386 architecture (x86 compatible Intel/AMD)

http://security.ubuntu.com/ubuntu/pool/main/t/tar/tar_1.15.1-2ubuntu2.1=
_i386.deb
Size/MD5: 519384 be7fa1ac67587e1ef574ed457e967454

powerpc architecture (Apple Macintosh G3/G4/G5)

http://security.ubuntu.com/ubuntu/pool/main/t/tar/tar_1.15.1-2ubuntu2.1=
_powerpc.deb
Size/MD5: 533876 4b9404feef3aaaf23cf28abd1432517b

sparc architecture (Sun SPARC/UltraSPARC)

http://security.ubuntu.com/ubuntu/pool/main/t/tar/tar_1.15.1-2ubuntu2.1=
_sparc.deb
Size/MD5: 523654 1164fe3b20e4f530df21258907f3cd9d

Updated packages for Ubuntu 6.10:

Source archives:

http://security.ubuntu.com/ubuntu/pool/main/t/tar/tar_1.15.91-2ubuntu0.=
3.diff.gz
Size/MD5: 16849 1776a8a649f3fec68c6990accd5f47c8
http://security.ubuntu.com/ubuntu/pool/main/t/tar/tar_1.15.91-2ubuntu0.=
3.dsc
Size/MD5: 596 58f9bea1622976afa48a7eb61e8945e8
http://security.ubuntu.com/ubuntu/pool/main/t/tar/tar_1.15.91.orig.tar.=
gz
Size/MD5: 2016367 e2338a16b0464ec03826e000dae990a0

amd64 architecture (Athlon64, Opteron, EM64T Xeon)

http://security.ubuntu.com/ubuntu/pool/main/t/tar/tar_1.15.91-2ubuntu0.=
3_amd64.deb
Size/MD5: 361636 9580b1e23dc58caf6af9543dbe045dca

i386 architecture (x86 compatible Intel/AMD)

http://security.ubuntu.com/ubuntu/pool/main/t/tar/tar_1.15.91-2ubuntu0.=
3_i386.deb
Size/MD5: 346396 4bb2868d5fc2855a8242c6c89c7afb12

powerpc architecture (Apple Macintosh G3/G4/G5)

http://security.ubuntu.com/ubuntu/pool/main/t/tar/tar_1.15.91-2ubuntu0.=
3_powerpc.deb
Size/MD5: 365486 79ddf1293d8e759fd96fee0c612d6000

sparc architecture (Sun SPARC/UltraSPARC)

http://security.ubuntu.com/ubuntu/pool/main/t/tar/tar_1.15.91-2ubuntu0.=
3_sparc.deb
Size/MD5: 348136 ffdb48742e8bc415682f18d6c74f70c2


--xB0nW4MQa6jZONgY
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFFa3U2H/9LqRcGPm0RAkYwAJ4yNjZ0CilRlgwwERBxpnzJ3lHDigCgk8iS
s4qkpMDo6ql86p2rTg7SpgM=
=mB9A
-----END PGP SIGNATURE-----

--xB0nW4MQa6jZONgY--


--===============1091247954==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============1091247954==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung