Public bug reported: Binary package hint: tar
References: DSA-1438-1 (http://www.debian.org/security/2007/dsa-1438) Bug #161173 Quoting: 'Buffer overflow in the safer_name_suffix function in GNU tar has unspecified attack vectors and impact, resulting in a "crashing stack."' I'm reporting this issue for tar, since I didn't found any correspoding USN. ** Affects: tar (Ubuntu) Importance: Undecided Status: New ** Visibility changed to: Public ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2007-4476 -- [tar] [CVE-2007-4476] Buffer overflow https://bugs.launchpad.net/bugs/180299 You received this bug notification because you are a member of Ubuntu Bugs, which is the bug contact for Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs