TSLSA-2006-0068 - multi
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- --------------------------------------------------------------------------
Trustix Secure Linux Security Advisory #2006-0068
Package names: gnupg, tar
Summary: Multiple vulnerabilities
Date: 2006-12-01
Affected versions: Trustix Secure Linux 2.2
Trustix Secure Linux 3.0
Trustix Operating System - Enterprise Server 2
- --------------------------------------------------------------------------
Package description:
gnupg
GnuPG is a complete and free replacement for PGP. Because it does not
use IDEA it can be used without any restrictions. GnuPG is in
compliance with the OpenPGP specification (RFC2440).
tar
The GNU tar program saves many files together in one archive and can
restore individual files (or all of the files) from that archive. Tar
can also be used to add supplemental files to an archive and to update
or list files in the archive. Tar includes multivolume support,
automatic archive compression/decompression, the ability to perform
remote archives, and the ability to perform incremental and full
backups.
Problem description:
gnupg < TSL 3.0 > < TSL 2.2 > < TSEL 2 >
- SECURITY Fix: Hugh Warrington has reported a vulnerability in GnuPG,
caused due to a boundary error in the "ask_outfile_name()" function
in openfile.c, because the "make_printable_string()" function can
return a string longer than the expected "NAMELEN". This can be
exploited to cause a buffer overflow.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CVE-2006-6169 to this issue.
tar < TSL 3.0 > < TSL 2.2 > < TSEL 2 >
- New Upstream
- Option -l is now an alias of --check-links option.
- SECURITY Fix: Teemu Salmela has reported a security issue in GNU tar,
caused due to the "extract_archive()" function in extract.c and the
"extract_mangle()" function in mangle.c still processing the
deprecated "GNUTYPE_NAMES" record type containing symbolic links.
This can be exploited to overwrite arbitrary files.
The Common Vulnerabilities and Exposures project has assigned the
name CVE-2006-6097 to this issue.
Action:
We recommend that all systems with this package installed be upgraded.
Please note that if you do not need the functionality provided by this
package, you may want to remove it from your system.
Location:
All Trustix Secure Linux updates are available from
<URI:http://http.trustix.org/pub/trustix/updates/>
<URI:ftp://ftp.trustix.org/pub/trustix/updates/>
About Trustix Secure Linux:
Trustix Secure Linux is a small Linux distribution for servers. With focus
on security and stability, the system is painlessly kept safe and up to
date from day one using swup, the automated software updater.
Automatic updates:
Users of the SWUP tool can enjoy having updates automatically
installed using 'swup --upgrade'.
Questions?
Check out our mailing lists:
<URI:http://www.trustix.org/support/>
Verification:
This advisory along with all Trustix packages are signed with the
TSL sign key.
This key is available from:
<URI:http://www.trustix.org/TSL-SIGN-KEY>
The advisory itself is available from the errata pages at
<URI:http://www.trustix.org/errata/trustix-2.2/> and
<URI:http://www.trustix.org/errata/trustix-3.0/>
or directly at
<URI:http://www.trustix.org/errata/2006/0068/>
MD5sums of the packages:
- --------------------------------------------------------------------------
6097b3d84c5edcc4e725b34a3f46e1d3 3.0/rpms/gnupg-1.4.5-2tr.i586.rpm
095c0af2edafddab2cfa7f85dcc182b8 3.0/rpms/gnupg-utils-1.4.5-2tr.i586.rpm
123a1567dbbc45ea1549d6f45fdead39 3.0/rpms/tar-1.16-1tr.i586.rpm
efb1b7a73d95299660d3dfe6d109894e 2.2/rpms/dds2tar-2.5.2-1tr.i586.rpm
c67559e5928660ef1b2654101e861696 2.2/rpms/gnupg-1.2.6-5tr.i586.rpm
def6ddab06d5fadc6044a12f55d4792a 2.2/rpms/gnupg-utils-1.2.6-5tr.i586.rpm
ba6a1459702d5f017695efdddd692ee4 2.2/rpms/tar-1.16-1tr.i586.rpm
- --------------------------------------------------------------------------
Trustix Security Team
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.6 (GNU/Linux)
iD8DBQFFcCsMi8CEzsK9IksRAosWAKCyczj9Keh+Ux5kQaNN3iJLO50WwgCeIUE3
uDFOO463YeHHWPDo3sPpFYg=
=c7Ry
-----END PGP SIGNATURE-----