TUCoPS :: Linux :: Trustix :: c07-1108.htm

Trustix Secure Linux - multiple vulns
TSLSA-2006-0068 - multi
TSLSA-2006-0068 - multi

Hash: SHA1

- --------------------------------------------------------------------------
Trustix Secure Linux Security Advisory #2006-0068

Package names:	   gnupg, tar
Summary:           Multiple vulnerabilities
Date:              2006-12-01
Affected versions: Trustix Secure Linux 2.2
                   Trustix Secure Linux 3.0
                   Trustix Operating System - Enterprise Server 2

- --------------------------------------------------------------------------
Package description:
  GnuPG is a complete and free replacement for PGP. Because it does not
  use IDEA it can be used without any restrictions. GnuPG is in
  compliance with the OpenPGP specification (RFC2440).

  The GNU tar program saves many files together in one archive and can
  restore individual files (or all of the files) from that archive. Tar
  can also be used to add supplemental files to an archive and to update
  or list files in the archive. Tar includes multivolume support,
  automatic archive compression/decompression, the ability to perform
  remote archives, and the ability to perform incremental and full

Problem description:
  gnupg  < TSL 3.0 > < TSL 2.2 > < TSEL 2 >
  - SECURITY Fix: Hugh Warrington has reported a vulnerability in GnuPG,
    caused due to a boundary error in the "ask_outfile_name()" function
    in openfile.c, because the "make_printable_string()" function can
    return a string longer than the expected "NAMELEN". This can be
    exploited to cause a buffer overflow.

    The Common Vulnerabilities and Exposures project (cve.mitre.org) has
    assigned the name CVE-2006-6169 to this issue.

  tar < TSL 3.0 > < TSL 2.2 > < TSEL 2 >
  - New Upstream
  - Option -l is now an alias of --check-links option.
  - SECURITY Fix: Teemu Salmela has reported a security issue in GNU tar,
    caused due to the "extract_archive()" function in extract.c and the
    "extract_mangle()" function in mangle.c still processing the
    deprecated "GNUTYPE_NAMES" record type containing symbolic links.
    This can be exploited to overwrite arbitrary files.

    The Common Vulnerabilities and Exposures project has assigned the
    name CVE-2006-6097 to this issue. 
  We recommend that all systems with this package installed be upgraded.
  Please note that if you do not need the functionality provided by this
  package, you may want to remove it from your system.

  All Trustix Secure Linux updates are available from

About Trustix Secure Linux:
  Trustix Secure Linux is a small Linux distribution for servers. With focus
  on security and stability, the system is painlessly kept safe and up to
  date from day one using swup, the automated software updater.

Automatic updates:
  Users of the SWUP tool can enjoy having updates automatically
  installed using 'swup --upgrade'.

  Check out our mailing lists:

  This advisory along with all Trustix packages are signed with the
  TSL sign key.
  This key is available from:

  The advisory itself is available from the errata pages at
  or directly at

MD5sums of the packages:
- --------------------------------------------------------------------------
6097b3d84c5edcc4e725b34a3f46e1d3  3.0/rpms/gnupg-1.4.5-2tr.i586.rpm
095c0af2edafddab2cfa7f85dcc182b8  3.0/rpms/gnupg-utils-1.4.5-2tr.i586.rpm
123a1567dbbc45ea1549d6f45fdead39  3.0/rpms/tar-1.16-1tr.i586.rpm

efb1b7a73d95299660d3dfe6d109894e  2.2/rpms/dds2tar-2.5.2-1tr.i586.rpm
c67559e5928660ef1b2654101e861696  2.2/rpms/gnupg-1.2.6-5tr.i586.rpm
def6ddab06d5fadc6044a12f55d4792a  2.2/rpms/gnupg-utils-1.2.6-5tr.i586.rpm
ba6a1459702d5f017695efdddd692ee4  2.2/rpms/tar-1.16-1tr.i586.rpm
- --------------------------------------------------------------------------

Trustix Security Team

Version: GnuPG v1.2.6 (GNU/Linux)


TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986- AOH