Upstream information

CVE-2006-6097 at MITRE

Description

GNU tar 1.16 and 1.15.1, and possibly other versions, allows user-assisted attackers to overwrite arbitrary files via a tar file that contains a GNUTYPE_NAMES record with a symbolic link, which is not properly handled by the extract_archive function in extract.c and extract_mangle function in mangle.c, a variant of CVE-2002-1216.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 4
Vector AV:N/AC:H/Au:N/C:N/I:P/A:P
Access Vector Network
Access Complexity High
Authentication None
Confidentiality Impact None
Integrity Impact Partial
Availability Impact Partial
SUSE Bugzilla entry: 223185 [RESOLVED / FIXED]

No SUSE Security Announcements cross referenced.

List of released packages

Product(s) Fixed package version(s) References
SUSE Linux Enterprise Server 11 SP1
  • tar >= 1.20-23.23.1
Patchnames:
SUSE Linux Enterprise Server 11 SP1 GA tar-1.20-23.23.1
SUSE Linux Enterprise Server 11 SP2
  • tar >= 1.26-1.2.4.1
Patchnames:
SUSE Linux Enterprise Server 11 SP2 GA tar-1.26-1.2.4.1
SUSE Linux Enterprise Server 11 SP3
  • tar >= 1.26-1.2.4.1
Patchnames:
SUSE Linux Enterprise Server 11 SP3 GA tar-1.26-1.2.4.1
SUSE Linux Enterprise Server 11 SP4
  • tar >= 1.26-1.2.6.1
Patchnames:
SUSE Linux Enterprise Server 11 SP4 GA tar-1.26-1.2.6.1
openSUSE Tumbleweed
  • tar >= 1.34-2.2
  • tar-backup-scripts >= 1.34-2.2
  • tar-doc >= 1.34-2.2
  • tar-lang >= 1.34-2.2
  • tar-rmt >= 1.34-2.2
  • tar-tests >= 1.34-2.2
Patchnames:
openSUSE Tumbleweed GA tar-1.34-2.2


SUSE Timeline for this CVE

CVE page created: Fri Jun 28 05:18:01 2013
CVE page last modified: Fri Oct 7 12:45:35 2022