CVE-2007-4131: GNU tar Directory Traversal Vulnerability

Related Vulnerabilities: CVE-2007-4131   CVE-2007-4476  

Debian Bug report logs - #439335
CVE-2007-4131: GNU tar Directory Traversal Vulnerability

version graph

Package: tar; Maintainer for tar is Bdale Garbee <bdale@gag.com>; Source for tar is src:tar (PTS, buildd, popcon).

Reported by: Luca Bruno <luca.br@uno.it>

Date: Fri, 24 Aug 2007 09:42:02 UTC

Severity: important

Tags: patch, security, upstream

Found in versions tar/1.18-1, tar/1.16-2

Fixed in versions tar/1.18-2, tar/1.14-2.4, tar/1.16-2etch4

Done: Florian Weimer <fw@deneb.enyo.de>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, Debian Security Team <team@security.debian.org>, Bdale Garbee <bdale@gag.com>:
Bug#439335; Package tar. (full text, mbox, link).


Acknowledgement sent to Luca Bruno <luca.br@uno.it>:
New Bug report received and forwarded. Copy sent to Debian Security Team <team@security.debian.org>, Bdale Garbee <bdale@gag.com>. (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Luca Bruno <luca.br@uno.it>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: CVE-2007-4131: GNU tar Directory Traversal Vulnerability
Date: Fri, 24 Aug 2007 11:35:22 +0200
Package: tar
Version: 1.18-1
Severity: grave
Tags: security patch

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- From CVE-2007-4131:
"The vulnerability is caused due to an input validation error when
extracting tar archives. This can be exploited to extract files to
arbitrary locations outside the specified directory with the permissions
of the user running GNU tar by using the ".." directory traversal
sequence in a specially crafted tar archive."

A patch is available in upstream CVS:
http://cvs.savannah.gnu.org/viewvc/tar/src/names.c?root=tar&r1=1.63&r2=1.64

The same portion of code is present also in versions 1.16 (stable) and
1.14 (oldstable), so this bug should be probably tracked and fixed there
too. However I'm not sure if there are other patches already applied
there to prevent this issue, so right now I'm reporting this bug for sid
only.

Cheers, Luca

- -- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (1, 'experimental')
Architecture: i386 (i686)

Kernel: Linux 2.6.20-1-686 (SMP w/1 CPU core)
Locale: LANG=it_IT.UTF-8, LC_CTYPE=it_IT.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages tar depends on:
ii  libc6                         2.6.1-1    GNU C Library: Shared libraries

tar recommends no packages.

- -- no debconf information

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFGzqZaRqobajv7n7MRAhfjAJ9PQ+ZxxO5cOhE5FZMWLl/V84qdtACgqoy6
Cn3M2jeuQ0UM9BUXqxUsPrQ=
=mvHJ
-----END PGP SIGNATURE-----



Information forwarded to debian-bugs-dist@lists.debian.org:
Bug#439335; Package tar. (full text, mbox, link).


Acknowledgement sent to Bdale Garbee <bdale@gag.com>:
Extra info received and forwarded to list. (full text, mbox, link).


Message #10 received at submit@bugs.debian.org (full text, mbox, reply):

From: Bdale Garbee <bdale@gag.com>
To: Luca Bruno <luca.br@uno.it>, 439335@bugs.debian.org
Cc: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: Re: Bug#439335: CVE-2007-4131: GNU tar Directory Traversal Vulnerability
Date: Fri, 24 Aug 2007 08:44:03 -0600
On Fri, 2007-08-24 at 11:35 +0200, Luca Bruno wrote:
> Package: tar
> Version: 1.18-1
> Severity: grave

Why does this merit a 'grave' severity when there is no apparent priv
escalation involved?

Bdale





Information forwarded to debian-bugs-dist@lists.debian.org:
Bug#439335; Package tar. (full text, mbox, link).


Acknowledgement sent to Bdale Garbee <bdale@gag.com>:
Extra info received and forwarded to list. (full text, mbox, link).


Bug marked as found in version 1.16-2. Request was from Filipus Klutiero <chealer@gmail.com> to control@bugs.debian.org. (Wed, 29 Aug 2007 06:06:02 GMT) (full text, mbox, link).


Tags added: upstream Request was from Filipus Klutiero <chealer@gmail.com> to control@bugs.debian.org. (Wed, 29 Aug 2007 06:06:02 GMT) (full text, mbox, link).


Information forwarded to debian-bugs-dist@lists.debian.org, Bdale Garbee <bdale@gag.com>:
Bug#439335; Package tar. (full text, mbox, link).


Acknowledgement sent to Stefan Fritsch <sf@sfritsch.de>:
Extra info received and forwarded to list. Copy sent to Bdale Garbee <bdale@gag.com>. (full text, mbox, link).


Message #24 received at 439335@bugs.debian.org (full text, mbox, reply):

From: Stefan Fritsch <sf@sfritsch.de>
To: 439335@bugs.debian.org
Subject: Re: Bug#439335: CVE-2007-4131: GNU tar Directory Traversal Vulnerability
Date: Wed, 29 Aug 2007 20:50:59 +0200
A user does not expect tar to allow absolute path names unless the -P 
option is given.



Severity set to `important' from `grave' Request was from bdale@gag.com (Bdale Garbee) to control@bugs.debian.org. (Wed, 29 Aug 2007 19:18:02 GMT) (full text, mbox, link).


Information forwarded to debian-bugs-dist@lists.debian.org:
Bug#439335; Package tar. (full text, mbox, link).


Acknowledgement sent to Bdale Garbee <bdale@gag.com>:
Extra info received and forwarded to list. (full text, mbox, link).


Message #31 received at 439335@bugs.debian.org (full text, mbox, reply):

From: Bdale Garbee <bdale@gag.com>
To: Stefan Fritsch <sf@sfritsch.de>, 439335@bugs.debian.org
Cc: control@bugs.debian.org
Subject: Re: Bug#439335: CVE-2007-4131: GNU tar Directory Traversal Vulnerability
Date: Wed, 29 Aug 2007 13:23:32 -0600
tags 439335 +pending
thanks

On Wed, 2007-08-29 at 20:50 +0200, Stefan Fritsch wrote:
> A user does not expect tar to allow absolute path names unless the -P 
> option is given.

That's not a justification for severity 'grave' in the Debian BTS. 

However, regardless of what we think the appropriate bug severity is,
I've just applied the patch in question in my tree and expect to upload
it soonish.

Bdale





Tags added: pending Request was from Bdale Garbee <bdale@gag.com> to control@bugs.debian.org. (Wed, 29 Aug 2007 19:27:02 GMT) (full text, mbox, link).


Reply sent to Bdale Garbee <bdale@gag.com>:
You have taken responsibility. (full text, mbox, link).


Notification sent to Luca Bruno <luca.br@uno.it>:
Bug acknowledged by developer. (full text, mbox, link).


Message #38 received at 439335-close@bugs.debian.org (full text, mbox, reply):

From: Bdale Garbee <bdale@gag.com>
To: 439335-close@bugs.debian.org
Subject: Bug#439335: fixed in tar 1.18-2
Date: Wed, 05 Sep 2007 10:32:03 +0000
Source: tar
Source-Version: 1.18-2

We believe that the bug you reported is fixed in the latest version of
tar, which is due to be installed in the Debian FTP archive:

tar_1.18-2.diff.gz
  to pool/main/t/tar/tar_1.18-2.diff.gz
tar_1.18-2.dsc
  to pool/main/t/tar/tar_1.18-2.dsc
tar_1.18-2_i386.deb
  to pool/main/t/tar/tar_1.18-2_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 439335@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Bdale Garbee <bdale@gag.com> (supplier of updated tar package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Wed, 05 Sep 2007 10:20:45 +0100
Source: tar
Binary: tar
Architecture: source i386
Version: 1.18-2
Distribution: unstable
Urgency: high
Maintainer: Bdale Garbee <bdale@gag.com>
Changed-By: Bdale Garbee <bdale@gag.com>
Description: 
 tar        - GNU tar
Closes: 433553 439335 439916
Changes: 
 tar (1.18-2) unstable; urgency=high
 .
   * patch from Neil Moore improving the man page, closes: #439916
   * patch from Justin Pryzby improving the man page, closes: #433553
   * patch from upstream to fix directory traversal concern on extraction
     documented in (CVE-2007-4131), closes: #439335
   * urgency to high since preceding bug has having security implications
Files: 
 87af661dc549fb89e70d4f8850859cd4 569 utils required tar_1.18-2.dsc
 7bcd67a71acb9d4c4e6b9ababc309ef9 40112 utils required tar_1.18-2.diff.gz
 d6c6861cbbf9a04cba3519f8f265d243 732978 utils required tar_1.18-2_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFG3oA+ZKfAp/LPAagRAnQKAJwLlYJ+ar/e8eree7HkcoSPTv9LywCfWxL+
320FXmkTEdoJohy87O9D964=
=Ae4x
-----END PGP SIGNATURE-----




Information forwarded to debian-bugs-dist@lists.debian.org, Bdale Garbee <bdale@gag.com>:
Bug#439335; Package tar. (full text, mbox, link).


Acknowledgement sent to Sylvain Beucler <beuc@gnu.org>:
Extra info received and forwarded to list. Copy sent to Bdale Garbee <bdale@gag.com>. (full text, mbox, link).


Message #43 received at 439335@bugs.debian.org (full text, mbox, reply):

From: Sylvain Beucler <beuc@gnu.org>
To: 439335@bugs.debian.org
Cc: savannah-hackers-public@gnu.org
Subject: Re: Bug#439335: CVE-2007-4131: GNU tar Directory Traversal
Date: Sun, 9 Sep 2007 10:43:15 +0200
Hi,

Was this forwarded to the Stable security team?

If I'm given a tarball that can replace /etc/passwd, I'd say this is
grave bug.

Thanks,

-- 
Sylvain




Information forwarded to debian-bugs-dist@lists.debian.org, Bdale Garbee <bdale@gag.com>:
Bug#439335; Package tar. (full text, mbox, link).


Acknowledgement sent to Nico Golde <nion@debian.org>:
Extra info received and forwarded to list. Copy sent to Bdale Garbee <bdale@gag.com>. (full text, mbox, link).


Message #48 received at 439335@bugs.debian.org (full text, mbox, reply):

From: Nico Golde <nion@debian.org>
To: Sylvain Beucler <beuc@gnu.org>, 439335@bugs.debian.org
Cc: savannah-hackers-public@gnu.org
Subject: Re: Bug#439335: CVE-2007-4131: GNU tar Directory Traversal
Date: Sun, 9 Sep 2007 14:30:06 +0200
[Message part 1 (text/plain, inline)]
Hi,
* Sylvain Beucler <beuc@gnu.org> [2007-09-09 13:56]:
> Was this forwarded to the Stable security team?
> 
> If I'm given a tarball that can replace /etc/passwd, I'd say this is
> grave bug.

This bug is monitored via the security tracker:
http://security-tracker.debian.net/tracker/CVE-2007-4131
So they should be aware of it.
Kind regards
Nico
-- 
Nico Golde - http://ngolde.de - nion@jabber.ccc.de - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
[Message part 2 (application/pgp-signature, inline)]

Information forwarded to debian-bugs-dist@lists.debian.org, Bdale Garbee <bdale@gag.com>:
Bug#439335; Package tar. (full text, mbox, link).


Acknowledgement sent to paddy@panici.net:
Extra info received and forwarded to list. Copy sent to Bdale Garbee <bdale@gag.com>. (full text, mbox, link).


Message #53 received at 439335@bugs.debian.org (full text, mbox, reply):

From: paddy@panici.net
To: 439335@bugs.debian.org, debian-security@lists.debian.org
Subject: Re: Bug#439335: CVE-2007-4131: GNU tar Directory Traversal
Date: Wed, 19 Dec 2007 22:51:35 +0000
previously ...

Nico Golde <nion@debian.org> [Sun, 9 Sep 2007 14:30:06 +0200]:
> Hi,
> * Sylvain Beucler <beuc@gnu.org> [2007-09-09 13:56]:
> > Was this forwarded to the Stable security team?
> > 
> > If I'm given a tarball that can replace /etc/passwd, I'd say this is
> > grave bug.
> 
> This bug is monitored via the security tracker:
> http://security-tracker.debian.net/tracker/CVE-2007-4131
> So they should be aware of it.

just noticed this going past in an osx update and had a "what ever
happenned to that?" moment.

Regards,
Paddy





Reply sent to Florian Weimer <fw@deneb.enyo.de>:
You have taken responsibility. (full text, mbox, link).


Notification sent to Luca Bruno <luca.br@uno.it>:
Bug acknowledged by developer. (full text, mbox, link).


Message #58 received at 439335-close@bugs.debian.org (full text, mbox, reply):

From: Florian Weimer <fw@deneb.enyo.de>
To: 439335-close@bugs.debian.org
Subject: Bug#439335: fixed in tar 1.14-2.4
Date: Fri, 28 Dec 2007 19:52:23 +0000
Source: tar
Source-Version: 1.14-2.4

We believe that the bug you reported is fixed in the latest version of
tar, which is due to be installed in the Debian FTP archive:

tar_1.14-2.4.diff.gz
  to pool/main/t/tar/tar_1.14-2.4.diff.gz
tar_1.14-2.4.dsc
  to pool/main/t/tar/tar_1.14-2.4.dsc
tar_1.14-2.4_i386.deb
  to pool/main/t/tar/tar_1.14-2.4_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 439335@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Florian Weimer <fw@deneb.enyo.de> (supplier of updated tar package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Wed, 26 Dec 2007 12:19:01 +0100
Source: tar
Binary: tar
Architecture: source i386
Version: 1.14-2.4
Distribution: oldstable-security
Urgency: high
Maintainer: Bdale Garbee <bdale@gag.com>
Changed-By: Florian Weimer <fw@deneb.enyo.de>
Description: 
 tar        - GNU tar
Closes: 439335 441444
Changes: 
 tar (1.14-2.4) oldstable-security; urgency=high
 .
   * Non-maintainer upload by the security team
   * Apply patch from Dmitry V. Levin <ldv@owl.openwall.com> to avoid a
     stack-based buffer overflow while processing certain file names
     (CVE-2007-4476).  Closes: #441444.
   * Apply patch from Dmitry V. Levin to fix double-dot recognition
     in case of duplicate / (CVE-2007-4131).  Closes: #439335.
Files: 
 cbcbbd7c638de842f913ac566c3f0b0a 846 base required tar_1.14-2.4.dsc
 2675ec9acdf59ba6f0c54e5325675fcf 51869 base required tar_1.14-2.4.diff.gz
 3b1099df9c1df15768f8dc568068e02f 500822 base required tar_1.14-2.4_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iQEVAwUBR3JTEL97/wQC1SS+AQIP4gf/SUnWTVcWn8qa8QXhlEfjct3ph4cOQRP7
/G6E9JDL7UaGavsR6O8JsBoSyl6cpwA4YCX54vZ9VA1P1NB2O/nkNFCG+rOX4zxl
WF2xl0Bj8ScPR5aSXC7KXgvhEVmF8NYzqRsfkW0NHGUNVH2BUGb1A/t2TEExPeB+
F9QXr9RoiNxwEEPcb5y46gRWZAgbbQBgdQeLUCQda9N4k1hqS1waEHuDbVA4F0bj
JUOV9rRS2Zm0lAmrUT9BwPYcQ2QjG1jhCunAl3pgERnc4ohDJ2ZrrSqmzLClVT7W
QJLL2YIOpFlIHbhNwX+jDNbQEPKirr3doO8z7im80bBf/z633H2/2A==
=7BMw
-----END PGP SIGNATURE-----





Reply sent to Florian Weimer <fw@deneb.enyo.de>:
You have taken responsibility. (full text, mbox, link).


Notification sent to Luca Bruno <luca.br@uno.it>:
Bug acknowledged by developer. (full text, mbox, link).


Message #63 received at 439335-close@bugs.debian.org (full text, mbox, reply):

From: Florian Weimer <fw@deneb.enyo.de>
To: 439335-close@bugs.debian.org
Subject: Bug#439335: fixed in tar 1.16-2etch4
Date: Fri, 28 Dec 2007 19:52:16 +0000
Source: tar
Source-Version: 1.16-2etch4

We believe that the bug you reported is fixed in the latest version of
tar, which is due to be installed in the Debian FTP archive:

tar_1.16-2etch4.diff.gz
  to pool/main/t/tar/tar_1.16-2etch4.diff.gz
tar_1.16-2etch4.dsc
  to pool/main/t/tar/tar_1.16-2etch4.dsc
tar_1.16-2etch4_amd64.deb
  to pool/main/t/tar/tar_1.16-2etch4_amd64.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 439335@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Florian Weimer <fw@deneb.enyo.de> (supplier of updated tar package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Wed, 26 Dec 2007 13:30:08 +0100
Source: tar
Binary: tar
Architecture: source amd64
Version: 1.16-2etch4
Distribution: stable-security
Urgency: high
Maintainer: Bdale Garbee <bdale@gag.com>
Changed-By: Florian Weimer <fw@deneb.enyo.de>
Description: 
 tar        - GNU tar
Closes: 439335 441444
Changes: 
 tar (1.16-2etch4) stable-security; urgency=high
 .
   * Non-maintainer upload by the security team
   * Apply patch from Dmitry V. Levin <ldv@owl.openwall.com> to avoid a
     stack-based buffer overflow while processing certain file names
     (CVE-2007-4476).  Closes: #441444.
   * Apply patch from Dmitry V. Levin to fix double-dot recognition
     in case of duplicate / (CVE-2007-4131).  Closes: #439335.
   * Update the autoconf scripts to the etch version (no functional
     changes, hopefully).
Files: 
 c7d9d75758a04174348cd65bb7aaab16 871 utils required tar_1.16-2etch4.dsc
 d971b9d6114ad0527ef89fab0d3167e0 2199571 utils required tar_1.16.orig.tar.gz
 96eb9bcd2d8257893a4f530eb00c9da5 31360 utils required tar_1.16-2etch4.diff.gz
 b7287060cfefae808c694a60f9cb421c 714108 utils required tar_1.16-2etch4_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iQEVAwUBR3KRfL97/wQC1SS+AQKnRgf+JPmUC5MqJLya8dlKBP4lJSd6UDivOyJF
3ojUEQ/hJB3+rC32GoaNw84MkOms12Ceoo4fBGVrmlSpsGUeIgjL2qy/c59jKOay
fCcEkqnR2LHmW7DttOT+P1VuUHtwAlOelIs02R58VgwEIFY3EWg4GqaTtYFN+IkV
0BSWyovPlcbTsrtuHUTDn/5MAcJgmi/QjnZTlBWMfwaIdAJNmsLQlqc24/qtTeZ/
FKuk2mPkVtewMJTXUjrFB8BWe/edzn+u/yo11zerAahv+vAhSBOnpH5r/p/RBP9t
aGOi7Ard2y5fh+JjAM+TOud/JbmaGBBLH/lUJnKNpexrDKotW626xw==
=7bmw
-----END PGP SIGNATURE-----





Reply sent to Florian Weimer <fw@deneb.enyo.de>:
You have taken responsibility. (full text, mbox, link).


Notification sent to Luca Bruno <luca.br@uno.it>:
Bug acknowledged by developer. (full text, mbox, link).


Message #68 received at 439335-close@bugs.debian.org (full text, mbox, reply):

From: Florian Weimer <fw@deneb.enyo.de>
To: 439335-close@bugs.debian.org
Subject: Bug#439335: fixed in tar 1.16-2etch4
Date: Sat, 16 Feb 2008 12:17:30 +0000
Source: tar
Source-Version: 1.16-2etch4

We believe that the bug you reported is fixed in the latest version of
tar, which is due to be installed in the Debian FTP archive:

tar_1.16-2etch4.diff.gz
  to pool/main/t/tar/tar_1.16-2etch4.diff.gz
tar_1.16-2etch4.dsc
  to pool/main/t/tar/tar_1.16-2etch4.dsc
tar_1.16-2etch4_amd64.deb
  to pool/main/t/tar/tar_1.16-2etch4_amd64.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 439335@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Florian Weimer <fw@deneb.enyo.de> (supplier of updated tar package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Wed, 26 Dec 2007 13:30:08 +0100
Source: tar
Binary: tar
Architecture: source amd64
Version: 1.16-2etch4
Distribution: stable-security
Urgency: high
Maintainer: Bdale Garbee <bdale@gag.com>
Changed-By: Florian Weimer <fw@deneb.enyo.de>
Description: 
 tar        - GNU tar
Closes: 439335 441444
Changes: 
 tar (1.16-2etch4) stable-security; urgency=high
 .
   * Non-maintainer upload by the security team
   * Apply patch from Dmitry V. Levin <ldv@owl.openwall.com> to avoid a
     stack-based buffer overflow while processing certain file names
     (CVE-2007-4476).  Closes: #441444.
   * Apply patch from Dmitry V. Levin to fix double-dot recognition
     in case of duplicate / (CVE-2007-4131).  Closes: #439335.
   * Update the autoconf scripts to the etch version (no functional
     changes, hopefully).
Files: 
 c7d9d75758a04174348cd65bb7aaab16 871 utils required tar_1.16-2etch4.dsc
 d971b9d6114ad0527ef89fab0d3167e0 2199571 utils required tar_1.16.orig.tar.gz
 96eb9bcd2d8257893a4f530eb00c9da5 31360 utils required tar_1.16-2etch4.diff.gz
 b7287060cfefae808c694a60f9cb421c 714108 utils required tar_1.16-2etch4_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iQEVAwUBR3KRfL97/wQC1SS+AQKnRgf+JPmUC5MqJLya8dlKBP4lJSd6UDivOyJF
3ojUEQ/hJB3+rC32GoaNw84MkOms12Ceoo4fBGVrmlSpsGUeIgjL2qy/c59jKOay
fCcEkqnR2LHmW7DttOT+P1VuUHtwAlOelIs02R58VgwEIFY3EWg4GqaTtYFN+IkV
0BSWyovPlcbTsrtuHUTDn/5MAcJgmi/QjnZTlBWMfwaIdAJNmsLQlqc24/qtTeZ/
FKuk2mPkVtewMJTXUjrFB8BWe/edzn+u/yo11zerAahv+vAhSBOnpH5r/p/RBP9t
aGOi7Ard2y5fh+JjAM+TOud/JbmaGBBLH/lUJnKNpexrDKotW626xw==
=7bmw
-----END PGP SIGNATURE-----





Reply sent to Florian Weimer <fw@deneb.enyo.de>:
You have taken responsibility. (full text, mbox, link).


Notification sent to Luca Bruno <luca.br@uno.it>:
Bug acknowledged by developer. (full text, mbox, link).


Message #73 received at 439335-close@bugs.debian.org (full text, mbox, reply):

From: Florian Weimer <fw@deneb.enyo.de>
To: 439335-close@bugs.debian.org
Subject: Bug#439335: fixed in tar 1.14-2.4
Date: Sat, 12 Apr 2008 17:54:57 +0000
Source: tar
Source-Version: 1.14-2.4

We believe that the bug you reported is fixed in the latest version of
tar, which is due to be installed in the Debian FTP archive:

tar_1.14-2.4.diff.gz
  to pool/main/t/tar/tar_1.14-2.4.diff.gz
tar_1.14-2.4.dsc
  to pool/main/t/tar/tar_1.14-2.4.dsc
tar_1.14-2.4_i386.deb
  to pool/main/t/tar/tar_1.14-2.4_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 439335@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Florian Weimer <fw@deneb.enyo.de> (supplier of updated tar package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Wed, 26 Dec 2007 12:19:01 +0100
Source: tar
Binary: tar
Architecture: source i386
Version: 1.14-2.4
Distribution: oldstable-security
Urgency: high
Maintainer: Bdale Garbee <bdale@gag.com>
Changed-By: Florian Weimer <fw@deneb.enyo.de>
Description: 
 tar        - GNU tar
Closes: 439335 441444
Changes: 
 tar (1.14-2.4) oldstable-security; urgency=high
 .
   * Non-maintainer upload by the security team
   * Apply patch from Dmitry V. Levin <ldv@owl.openwall.com> to avoid a
     stack-based buffer overflow while processing certain file names
     (CVE-2007-4476).  Closes: #441444.
   * Apply patch from Dmitry V. Levin to fix double-dot recognition
     in case of duplicate / (CVE-2007-4131).  Closes: #439335.
Files: 
 cbcbbd7c638de842f913ac566c3f0b0a 846 base required tar_1.14-2.4.dsc
 2675ec9acdf59ba6f0c54e5325675fcf 51869 base required tar_1.14-2.4.diff.gz
 3b1099df9c1df15768f8dc568068e02f 500822 base required tar_1.14-2.4_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iQEVAwUBR3JTEL97/wQC1SS+AQIP4gf/SUnWTVcWn8qa8QXhlEfjct3ph4cOQRP7
/G6E9JDL7UaGavsR6O8JsBoSyl6cpwA4YCX54vZ9VA1P1NB2O/nkNFCG+rOX4zxl
WF2xl0Bj8ScPR5aSXC7KXgvhEVmF8NYzqRsfkW0NHGUNVH2BUGb1A/t2TEExPeB+
F9QXr9RoiNxwEEPcb5y46gRWZAgbbQBgdQeLUCQda9N4k1hqS1waEHuDbVA4F0bj
JUOV9rRS2Zm0lAmrUT9BwPYcQ2QjG1jhCunAl3pgERnc4ohDJ2ZrrSqmzLClVT7W
QJLL2YIOpFlIHbhNwX+jDNbQEPKirr3doO8z7im80bBf/z633H2/2A==
=7BMw
-----END PGP SIGNATURE-----





Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Tue, 22 Jul 2008 07:31:30 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 17:41:05 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.