Back in January of 2005, Joey Hess pointed out in a bug report against
Debian's package of tar that's actually an enhancement request, and as I
clean up my open bug list in preparation for the next Debian release I
realized we never passed it along.

The concern expressed is that tar is vulnerable to potential phishing
attacks because the rmt support doesn't require a slash after the colon,
and thus what's intended to be used for a path name could in theory be
used to enable a network exploit.  More details in the bug log at:

  https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=290435

I have to admit that I can't remember the last time I actually used the
rmt support... today it seems so much more obvious to pipe things over
an ssh connection, etc?

Any thoughts on whether to take any action on this now, and if so, what,
would be appreciated.

Regards,

Bdale

Attachment: signature.asc
Description: PGP signature

Reply via email to