Public bug reported:

Binary package hint: tar

References:
DSA-1438-1 (http://www.debian.org/security/2007/dsa-1438)
Bug #161173

Quoting:
'Buffer overflow in the safer_name_suffix function in GNU tar has unspecified 
attack vectors and impact, resulting in a "crashing stack."'

I'm reporting this issue for tar, since I didn't found any correspoding
USN.

** Affects: tar (Ubuntu)
     Importance: Undecided
         Status: New

** Visibility changed to: Public

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2007-4476

-- 
[tar] [CVE-2007-4476] Buffer overflow
https://bugs.launchpad.net/bugs/180299
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to