blob: dc3ea0b0f5172dafaecd22d079773b0dcbba1b85 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200612-10">
<title>Tar: Directory traversal vulnerability</title>
Tar is vulnerable to directory traversal possibly allowing for the
overwriting of arbitrary files.
<product type="ebuild">tar</product>
<announced>December 11, 2006</announced>
<revised>December 11, 2006: 01</revised>
<package name="app-arch/tar" auto="yes" arch="*">
<unaffected range="ge">1.16-r2</unaffected>
<vulnerable range="lt">1.16-r2</vulnerable>
The Tar program provides the ability to create and manipulate tar
Tar does not properly extract archive elements using the GNUTYPE_NAMES
record name, allowing files to be created at arbitrary locations using
symlinks. Once a symlink is extracted, files after the symlink in the
archive will be extracted to the destination of the symlink.
<impact type="normal">
An attacker could entice a user to extract a specially crafted tar
archive, possibly allowing for the overwriting of arbitrary files on
the system extracting the archive.
There is no known workaround at this time.
All Tar users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=app-arch/tar-1.16-r2&quot;</code>
<uri link="">CVE-2006-6097</uri>
<metadata tag="requester" timestamp="Thu, 07 Dec 2006 10:14:08 +0000">
<metadata tag="bugReady" timestamp="Sun, 10 Dec 2006 20:35:35 +0000">
<metadata tag="submitter" timestamp="Mon, 11 Dec 2006 17:59:09 +0000">