Launchpad has imported 12 comments from the remote bug at
https://bugzilla.redhat.com/show_bug.cgi?id=280961.

If you reply to an imported comment from within Launchpad, your comment
will be sent to the remote bug automatically. Read more about
Launchpad's inter-bugtracker facilities at
https://help.launchpad.net/InterBugTracking.

------------------------------------------------------------------------
On 2007-09-06T17:01:45+00:00 Tomas wrote:

Common Vulnerabilities and Exposures assigned an identifier CVE-2007-4476
to the following vulnerability:

Bug in the safer_name_suffix function in GNU tar may lead to a "crashing
stack".  It can be used to crash tar while extracting archive containing file
with long name containing unsafe prefix.

Affected function is also part of cpio source code.

References:

http://www.novell.com/linux/security/advisories/2007_18_sr.html
http://lists.gnu.org/archive/html/bug-cpio/2007-08/msg00002.html

Reply at:
https://bugs.launchpad.net/ubuntu/+source/cpio/+bug/161173/comments/0

------------------------------------------------------------------------
On 2007-09-06T17:05:50+00:00 Tomas wrote:

Upstream patch for paxutils / paxlib (used by recent versions of tar and
cpio):

http://cvs.savannah.gnu.org/viewvc/paxutils/paxutils/paxlib/names.c?r1=1.2&r2=1.4


Reply at: https://bugs.launchpad.net/ubuntu/+source/cpio/+bug/161173/comments/1

------------------------------------------------------------------------
On 2007-10-24T15:35:04+00:00 Radek wrote:

Created attachment 236281
patch for cpio-2.6

this patch should work for all affected software as the rest of patch from
comment #1 are just optimizations for memory usage (one malloc less)

Reply at:
https://bugs.launchpad.net/ubuntu/+source/cpio/+bug/161173/comments/2

------------------------------------------------------------------------
On 2007-10-24T15:40:00+00:00 Radek wrote:

Fedora builds of fixed tar are now complete (with the patch from upstream):
  tar-1.15.1-27.fc6
  tar-1.15.1-28.fc7
  tar-1.17-4.fc8
  tar-1.17-4.fc9


Reply at: https://bugs.launchpad.net/ubuntu/+source/cpio/+bug/161173/comments/3

------------------------------------------------------------------------
On 2007-10-29T19:02:36+00:00 Fedora wrote:

tar-1.15.1-28.fc7 has been pushed to the Fedora 7 stable repository.  If
problems still persist, please make note of it in this bug report.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/cpio/+bug/161173/comments/4

------------------------------------------------------------------------
On 2007-11-01T18:43:20+00:00 Radek wrote:

Created attachment 245931
new patch for cpio-2.6 (this one frees malloc'd memory)

Reply at:
https://bugs.launchpad.net/ubuntu/+source/cpio/+bug/161173/comments/5

------------------------------------------------------------------------
On 2007-11-02T13:44:11+00:00 Radek wrote:

fixed Fedora builds of cpio:
  cpio-2.6-22.fc6
  cpio-2.6-28.fc7
  cpio-2.9-5.fc8
  cpio-2.9-5.fc9


Reply at: https://bugs.launchpad.net/ubuntu/+source/cpio/+bug/161173/comments/6

------------------------------------------------------------------------
On 2007-11-05T15:06:18+00:00 Fedora wrote:

cpio-2.6-28.fc7 has been pushed to the Fedora 7 stable repository.  If
problems still persist, please make note of it in this bug report.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/cpio/+bug/161173/comments/7

------------------------------------------------------------------------
On 2007-11-06T16:05:52+00:00 Fedora wrote:

tar-1.17-4.fc8 has been pushed to the Fedora 8 stable repository.  If
problems still persist, please make note of it in this bug report.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/cpio/+bug/161173/comments/8

------------------------------------------------------------------------
On 2007-11-06T16:08:27+00:00 Fedora wrote:

cpio-2.9-5.fc8 has been pushed to the Fedora 8 stable repository.  If
problems still persist, please make note of it in this bug report.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/cpio/+bug/161173/comments/9

------------------------------------------------------------------------
On 2010-03-15T23:55:40+00:00 errata-xmlrpc wrote:

This issue has been addressed in following products:

  Red Hat Enterprise Linux 4
  Red Hat Enterprise Linux 5

Via RHSA-2010:0141 https://rhn.redhat.com/errata/RHSA-2010-0141.html

Reply at:
https://bugs.launchpad.net/ubuntu/+source/cpio/+bug/161173/comments/31

------------------------------------------------------------------------
On 2010-03-16T01:15:30+00:00 errata-xmlrpc wrote:

This issue has been addressed in following products:

  Red Hat Enterprise Linux 5

Via RHSA-2010:0144 https://rhn.redhat.com/errata/RHSA-2010-0144.html

Reply at:
https://bugs.launchpad.net/ubuntu/+source/cpio/+bug/161173/comments/32


** Changed in: fedora
       Status: Confirmed => Fix Released

** Changed in: fedora
   Importance: Unknown => Low

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to cpio in Ubuntu.
https://bugs.launchpad.net/bugs/161173

Title:
  [CVE-2007-4476] cpio is affected by this CVE as tar.

Status in cpio package in Ubuntu:
  Fix Released
Status in cpio source package in Dapper:
  Fix Released
Status in cpio source package in Edgy:
  Invalid
Status in cpio source package in Feisty:
  Fix Released
Status in cpio source package in Gutsy:
  Fix Released
Status in Fedora:
  Fix Released

Bug description:
  Binary package hint: cpio

  Dear Colleagues,

  cpio has the same security issue like tar, as explained in
  CVE-2007-4476.

  Buffer overflow in the safer_name_suffix function in GNU tar has
  unspecified attack vectors and impact, resulting in a "crashing stack."

  I'll provide some security updates for dapper, edgy, feisty, gutsy as
  well a merge for the latest hardy upload.

  Regards,

  \sh

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/cpio/+bug/161173/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to     : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to