Описание
Buffer overflow in the safer_name_suffix function in GNU tar has unspecified attack vectors and impact, resulting in a "crashing stack."
Релиз | Статус | Примечание |
---|---|---|
dapper | released | 2.6-10ubuntu0.3 |
devel | not-affected | 2.9-13ubuntu1 |
edgy | ignored | end of life, was needed |
feisty | released | 2.6-17ubuntu0.7.04.1 |
gutsy | released | 2.8-1ubuntu2.2 |
hardy | not-affected | 2.9-6ubuntu1 |
intrepid | not-affected | 2.9-13ubuntu1 |
upstream | released | 2.9-5 |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
dapper | released | 1.15.1-2ubuntu2.3 |
devel | not-affected | |
edgy | ignored | end of life, was needed |
feisty | ignored | end of life, was needed |
gutsy | released | 1.18-2ubuntu1.1 |
hardy | not-affected | |
intrepid | not-affected | |
upstream | released | 1.18-2 |
Показывать по
EPSS
7.5 High
CVSS2
Связанные уязвимости
Buffer overflow in the safer_name_suffix function in GNU tar has unspecified attack vectors and impact, resulting in a "crashing stack."
Buffer overflow in the safer_name_suffix function in GNU tar has unspecified attack vectors and impact, resulting in a "crashing stack."
Buffer overflow in the safer_name_suffix function in GNU tar has unspe ...
Buffer overflow in the safer_name_suffix function in GNU tar has unspecified attack vectors and impact, resulting in a "crashing stack."
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
EPSS
7.5 High
CVSS2