blob: 9f89f86f2a3b69bb31a198d63c42b2d2dd788cb5 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200709-09">
<title>GNU Tar: Directory traversal vulnerability</title>
A directory traversal vulnerability has been discovered in GNU Tar.
<product type="ebuild">tar</product>
<announced>September 15, 2007</announced>
<revised>September 15, 2007: 01</revised>
<package name="app-arch/tar" auto="yes" arch="*">
<unaffected range="ge">1.18-r2</unaffected>
<vulnerable range="lt">1.18-r2</vulnerable>
The GNU Tar program provides the ability to create tar archives, as
well as various other kinds of manipulation.
Dmitry V. Levin discovered a directory traversal vulnerability in the
contains_dot_dot() function in file src/names.c.
<impact type="normal">
By enticing a user to extract a specially crafted tar archive, a remote
attacker could extract files to arbitrary locations outside of the
specified directory with the permissions of the user running GNU Tar.
There is no known workaround at this time.
All GNU Tar users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=app-arch/tar-1.18-r2&quot;</code>
<uri link="">CVE-2007-4131</uri>
<metadata tag="submitter" timestamp="Thu, 13 Sep 2007 18:11:35 +0000">
<metadata tag="bugReady" timestamp="Thu, 13 Sep 2007 18:49:13 +0000">