Описание
Buffer overflow in the safer_name_suffix function in GNU tar has unspecified attack vectors and impact, resulting in a "crashing stack."
| Релиз | Статус | Примечание |
|---|---|---|
| dapper | released | 2.6-10ubuntu0.3 |
| devel | not-affected | 2.9-13ubuntu1 |
| edgy | ignored | end of life, was needed |
| feisty | released | 2.6-17ubuntu0.7.04.1 |
| gutsy | released | 2.8-1ubuntu2.2 |
| hardy | not-affected | 2.9-6ubuntu1 |
| intrepid | not-affected | 2.9-13ubuntu1 |
| upstream | released | 2.9-5 |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| dapper | released | 1.15.1-2ubuntu2.3 |
| devel | not-affected | |
| edgy | ignored | end of life, was needed |
| feisty | ignored | end of life, was needed |
| gutsy | released | 1.18-2ubuntu1.1 |
| hardy | not-affected | |
| intrepid | not-affected | |
| upstream | released | 1.18-2 |
Показывать по
EPSS
7.5 High
CVSS2
Связанные уязвимости
Buffer overflow in the safer_name_suffix function in GNU tar has unspecified attack vectors and impact, resulting in a "crashing stack."
Buffer overflow in the safer_name_suffix function in GNU tar has unspecified attack vectors and impact, resulting in a "crashing stack."
Buffer overflow in the safer_name_suffix function in GNU tar has unspe ...
Buffer overflow in the safer_name_suffix function in GNU tar has unspecified attack vectors and impact, resulting in a "crashing stack."
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
EPSS
7.5 High
CVSS2