Summary: | <app-arch/tar-1.29-r1: extract pathname bypass | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Kristian Fiskerstrand (RETIRED) <k_f> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | base-system, sudormrfhalt |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://sintonen.fi/advisories/tar-extract-pathname-bypass.proper.txt | ||
Whiteboard: | A3 [glsa cve] | ||
Package list: | Runtime testing required: | --- |
Description
Kristian Fiskerstrand (RETIRED)
2016-10-28 10:09:47 UTC
Added patch in app-arch/tar-1.29-r1 https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=f79804de6297450e101d97411e7f74f06d22d787 We should be good to stabilize this. @arches: please stabilize =app-arch/tar-1.29-r1 Stable for HPPA. amd64 stable x86 stable Stable for PPC64. arm stable done the rest now @maintainer(s), please clean the vulnerable versions from the tree. This issue was resolved and addressed in GLSA 201611-19 at https://security.gentoo.org/glsa/201611-19 by GLSA coordinator Aaron Bauman (b-man). commit 204a2aaac4657909edb11d2ebd3837707e9b9485 Author: Lars Wendler <polynomial-c@gentoo.org> Date: Thu Dec 22 23:56:53 2016 app-arch/tar: Removed old. Package-Manager: Portage-2.3.3, Repoman-2.3.1 *** Bug 620012 has been marked as a duplicate of this bug. *** |