Boletines de Vulnerabilidades |
Múltiples vulnerabilidades en el kernel de Linux |
|
Clasificación de la vulnerabilidad |
|
Propiedad | Valor |
Nivel de Confianza | Oficial |
Impacto | Obtener acceso |
Dificultad | Experto |
Requerimientos del atacante | Acceso remoto sin cuenta a un servicio estandar |
Información sobre el sistema |
|
Propiedad | Valor |
Fabricante afectado | GNU/Linux |
Software afectado | Linux kernel |
Descripción |
|
Se han encontrado múltiples vulnerabilidades en el kernel de Linux. Las vulnerabilidades son descritas a continuación. - CVE-2007-2956: Se ha encontrado una vulnerabilidad del tipo desbordamiento de búfer en pfstools 1.6.2 en los archivos src/fileformat/rgbeio.cpp y en Qtpfsgui 1.8.11 en los archivos src/Fileformat/rgbeio.cpp. La vulnerabilidad reside en un error en la función readRadianceHeader. Un atacante remoto podría ejecutar código arbitrario mediante un archivo Radiance RGBE especialmente diseñado. - CVE-2007-4135: Se ha encontrado una vulnerabilidad en el NFSv4 ID mapper. La vulnerabilidad reside en un error en la traducción de nombre a uid. La vulnerabilidad podría provocar resoluciones de nombres NFSv4 incorrectas. - CVE-2007-4476: Se ha encontrado una vulnerabilidad en GNU tar. La vulnerabilidad reside en un error en la función safer_name_suffix().Se desconoce el impacto de dicha vulnerabilidad así como sus métodos de ataque. - CVE-2007-4510: Se ha encontrado una vulnerabilidad en ClamAV en las versiones anteriores a la 0.91.2 en los archivos libclamav/rtf.c y libclamav/htmlnorm.c. La vulnerabilidad reside en una referencia nula en las funciones cli_scanrtf y cli_html_normalise. Un atacante remoto podría causar una denegación de servicio mediante un archivo RTF especialmente diseñado o un documento HTML especialmente diseñado con una URI "data:". - CVE-2007-4560: Se ha encontrado una vulnerabilidad en ClamAV en las versiones anteriores a la 0.91.2. La vulnerabilidad se da cuando es ejecutado en modo black hole. Un atacante remoto podría ejecutar comandos arbitrarios mediante metacaracteres shell que son utilizados en ciertas llamadas popen. |
|
Solución |
|
Actualización de software Suse Linux Las actualizaciones pueden descargarse mediante YAST o del servidor FTP oficial de Suse Linux. Debian (DSA 1366-1) Debian Linux 4.0 Source http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1-3etch7.dsc http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1-3etch7.diff.gz http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1.orig.tar.gz Architecture independent http://security.debian.org/pool/updates/main/c/clamav/clamav-base_0.90.1-3etch7_all.deb http://security.debian.org/pool/updates/main/c/clamav/clamav-docs_0.90.1-3etch7_all.deb http://security.debian.org/pool/updates/main/c/clamav/clamav-testfiles_0.90.1-3etch7_all.deb Alpha http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1-3etch7_alpha.deb http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.90.1-3etch7_alpha.deb http://security.debian.org/pool/updates/main/c/clamav/clamav-dbg_0.90.1-3etch7_alpha.deb http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.90.1-3etch7_alpha.deb http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.90.1-3etch7_alpha.deb http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.90.1-3etch7_alpha.deb http://security.debian.org/pool/updates/main/c/clamav/libclamav2_0.90.1-3etch7_alpha.deb AMD64 http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1-3etch7_amd64.deb http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.90.1-3etch7_amd64.deb http://security.debian.org/pool/updates/main/c/clamav/clamav-dbg_0.90.1-3etch7_amd64.deb http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.90.1-3etch7_amd64.deb http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.90.1-3etch7_amd64.deb http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.90.1-3etch7_amd64.deb http://security.debian.org/pool/updates/main/c/clamav/libclamav2_0.90.1-3etch7_amd64.deb ARM http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1-3etch7_arm.deb http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.90.1-3etch7_arm.deb http://security.debian.org/pool/updates/main/c/clamav/clamav-dbg_0.90.1-3etch7_arm.deb http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.90.1-3etch7_arm.deb http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.90.1-3etch7_arm.deb http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.90.1-3etch7_arm.deb http://security.debian.org/pool/updates/main/c/clamav/libclamav2_0.90.1-3etch7_arm.deb HP Precision http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1-3etch7_hppa.deb http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.90.1-3etch7_hppa.deb http://security.debian.org/pool/updates/main/c/clamav/clamav-dbg_0.90.1-3etch7_hppa.deb http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.90.1-3etch7_hppa.deb http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.90.1-3etch7_hppa.deb http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.90.1-3etch7_hppa.deb http://security.debian.org/pool/updates/main/c/clamav/libclamav2_0.90.1-3etch7_hppa.deb Intel IA-32 http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1-3etch7_i386.deb http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.90.1-3etch7_i386.deb http://security.debian.org/pool/updates/main/c/clamav/clamav-dbg_0.90.1-3etch7_i386.deb http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.90.1-3etch7_i386.deb http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.90.1-3etch7_i386.deb http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.90.1-3etch7_i386.deb http://security.debian.org/pool/updates/main/c/clamav/libclamav2_0.90.1-3etch7_i386.deb Intel IA-64 http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1-3etch7_ia64.deb http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.90.1-3etch7_ia64.deb http://security.debian.org/pool/updates/main/c/clamav/clamav-dbg_0.90.1-3etch7_ia64.deb http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.90.1-3etch7_ia64.deb http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.90.1-3etch7_ia64.deb http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.90.1-3etch7_ia64.deb http://security.debian.org/pool/updates/main/c/clamav/libclamav2_0.90.1-3etch7_ia64.deb Big endian MIPS http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1-3etch7_mips.deb http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.90.1-3etch7_mips.deb http://security.debian.org/pool/updates/main/c/clamav/clamav-dbg_0.90.1-3etch7_mips.deb http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.90.1-3etch7_mips.deb http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.90.1-3etch7_mips.deb http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.90.1-3etch7_mips.deb http://security.debian.org/pool/updates/main/c/clamav/libclamav2_0.90.1-3etch7_mips.deb Little endian MIPS http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1-3etch7_mipsel.deb http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.90.1-3etch7_mipsel.deb http://security.debian.org/pool/updates/main/c/clamav/clamav-dbg_0.90.1-3etch7_mipsel.deb http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.90.1-3etch7_mipsel.deb http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.90.1-3etch7_mipsel.deb http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.90.1-3etch7_mipsel.deb http://security.debian.org/pool/updates/main/c/clamav/libclamav2_0.90.1-3etch7_mipsel.deb PowerPC http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1-3etch7_powerpc.deb http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.90.1-3etch7_powerpc.deb http://security.debian.org/pool/updates/main/c/clamav/clamav-dbg_0.90.1-3etch7_powerpc.deb http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.90.1-3etch7_powerpc.deb http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.90.1-3etch7_powerpc.deb http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.90.1-3etch7_powerpc.deb http://security.debian.org/pool/updates/main/c/clamav/libclamav2_0.90.1-3etch7_powerpc.deb IBM S/390 http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1-3etch7_s390.deb http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.90.1-3etch7_s390.deb http://security.debian.org/pool/updates/main/c/clamav/clamav-dbg_0.90.1-3etch7_s390.deb http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.90.1-3etch7_s390.deb http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.90.1-3etch7_s390.deb http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.90.1-3etch7_s390.deb http://security.debian.org/pool/updates/main/c/clamav/libclamav2_0.90.1-3etch7_s390.deb Sun Sparc http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1-3etch7_sparc.deb http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.90.1-3etch7_sparc.deb http://security.debian.org/pool/updates/main/c/clamav/clamav-dbg_0.90.1-3etch7_sparc.deb http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.90.1-3etch7_sparc.deb http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.90.1-3etch7_sparc.deb http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.90.1-3etch7_sparc.deb http://security.debian.org/pool/updates/main/c/clamav/libclamav2_0.90.1-3etch7_sparc.deb Mandriva (MDKSA-2007:172) Corporate Server 3.0 X86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/i586/clamav-0.91.2-0.1.C30mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/i586/clamav-db-0.91.2-0.1.C30mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/i586/clamav-milter-0.91.2-0.1.C30mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/i586/clamd-0.91.2-0.1.C30mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/i586/clamdmon-0.91.2-0.1.C30mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/i586/libclamav-devel-0.91.2-0.1.C30mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/i586/libclamav2-0.91.2-0.1.C30mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/SRPMS/clamav-0.91.2-0.1.C30mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/x86_64/clamav-0.91.2-0.1.C30mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/x86_64/clamav-db-0.91.2-0.1.C30mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/x86_64/clamav-milter-0.91.2-0.1.C30mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/x86_64/clamd-0.91.2-0.1.C30mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/x86_64/clamdmon-0.91.2-0.1.C30mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/x86_64/lib64clamav-devel-0.91.2-0.1.C30mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/x86_64/lib64clamav2-0.91.2-0.1.C30mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/SRPMS/clamav-0.91.2-0.1.C30mdk.src.rpm Mandriva Linux 2007 X86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/i586/clamav-0.91.2-1.1mdv2007.0.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/i586/clamav-db-0.91.2-1.1mdv2007.0.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/i586/clamav-milter-0.91.2-1.1mdv2007.0.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/i586/clamd-0.91.2-1.1mdv2007.0.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/i586/clamdmon-0.91.2-1.1mdv2007.0.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/i586/libclamav-devel-0.91.2-1.1mdv2007.0.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/i586/libclamav2-0.91.2-1.1mdv2007.0.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/SRPMS/clamav-0.91.2-1.1mdv2007.0.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/x86_64/clamav-0.91.2-1.1mdv2007.0.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/x86_64/clamav-db-0.91.2-1.1mdv2007.0.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/x86_64/clamav-milter-0.91.2-1.1mdv2007.0.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/x86_64/clamd-0.91.2-1.1mdv2007.0.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/x86_64/clamdmon-0.91.2-1.1mdv2007.0.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/x86_64/lib64clamav-devel-0.91.2-1.1mdv2007.0.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/x86_64/lib64clamav2-0.91.2-1.1mdv2007.0.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/SRPMS/clamav-0.91.2-1.1mdv2007.0.src.rpm Corporate Server 4.0 X86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/i586/clamav-0.91.2-0.1.20060mlcs4.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/i586/clamav-db-0.91.2-0.1.20060mlcs4.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/i586/clamav-milter-0.91.2-0.1.20060mlcs4.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/i586/clamd-0.91.2-0.1.20060mlcs4.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/i586/clamdmon-0.91.2-0.1.20060mlcs4.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/i586/libclamav-devel-0.91.2-0.1.20060mlcs4.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/i586/libclamav2-0.91.2-0.1.20060mlcs4.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/SRPMS/clamav-0.91.2-0.1.20060mlcs4.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/x86_64/clamav-0.91.2-0.1.20060mlcs4.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/x86_64/clamav-db-0.91.2-0.1.20060mlcs4.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/x86_64/clamav-milter-0.91.2-0.1.20060mlcs4.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/x86_64/clamd-0.91.2-0.1.20060mlcs4.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/x86_64/clamdmon-0.91.2-0.1.20060mlcs4.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/x86_64/lib64clamav-devel-0.91.2-0.1.20060mlcs4.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/x86_64/lib64clamav2-0.91.2-0.1.20060mlcs4.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/SRPMS/clamav-0.91.2-0.1.20060mlcs4.src.rpm Mandriva Linux 2007.1 X86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.1/i586/clamav-0.91.2-1.1mdv2007.1.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.1/i586/clamav-db-0.91.2-1.1mdv2007.1.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.1/i586/clamav-milter-0.91.2-1.1mdv2007.1.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.1/i586/clamd-0.91.2-1.1mdv2007.1.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.1/i586/clamdmon-0.91.2-1.1mdv2007.1.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.1/i586/libclamav-devel-0.91.2-1.1mdv2007.1.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.1/i586/libclamav2-0.91.2-1.1mdv2007.1.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.1/SRPMS/clamav-0.91.2-1.1mdv2007.1.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.1/x86_64/clamav-0.91.2-1.1mdv2007.1.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.1/x86_64/clamav-db-0.91.2-1.1mdv2007.1.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.1/x86_64/clamav-milter-0.91.2-1.1mdv2007.1.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.1/x86_64/clamd-0.91.2-1.1mdv2007.1.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.1/x86_64/clamdmon-0.91.2-1.1mdv2007.1.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.1/x86_64/lib64clamav-devel-0.91.2-1.1mdv2007.1.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.1/x86_64/lib64clamav2-0.91.2-1.1mdv2007.1.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.1/SRPMS/clamav-0.91.2-1.1mdv2007.1.src.rpm Red Hat (RHSA-2007:0951-2) RHEL Desktop Workstation (v. 5 client) Red Hat Enterprise Linux (v. 5 server) Red Hat Enterprise Linux Desktop (v. 5 client) https://rhn.redhat.com/ Mandriva (MDKSA-2007:197) Mandriva Linux 2007 X86 2007.0/i586/tar-1.15.91-1.3mdv2007.0.i586.rpm 2007.0/SRPMS/tar-1.15.91-1.3mdv2007.0.src.rpm X86_64 2007.0/x86_64/tar-1.15.91-1.3mdv2007.0.x86_64.rpm 2007.0/SRPMS/tar-1.15.91-1.3mdv2007.0.src.rpm Corporate Server 4.0 X86 corporate/4.0/i586/tar-1.15.1-5.4.20060mlcs4.i586.rpm corporate/4.0/SRPMS/tar-1.15.1-5.4.20060mlcs4.src.rpm X86_64 corporate/4.0/x86_64/tar-1.15.1-5.4.20060mlcs4.x86_64.rpm corporate/4.0/SRPMS/tar-1.15.1-5.4.20060mlcs4.src.rpm Mandriva Linux 2007.1 X86 2007.1/i586/tar-1.16-3.2mdv2007.1.i586.rpm 2007.1/SRPMS/tar-1.16-3.2mdv2007.1.src.rpm X86_64 2007.1/x86_64/tar-1.16-3.2mdv2007.1.x86_64.rpm 2007.1/SRPMS/tar-1.16-3.2mdv2007.1.src.rpm Mandriva Linux 2008.0 X86 2008.0/i586/tar-1.18-1.1mdv2008.0.i586.rpm 2008.0/SRPMS/tar-1.18-1.1mdv2008.0.src.rpm X86_64 2008.0/x86_64/tar-1.18-1.1mdv2008.0.x86_64.rpm 2008.0/SRPMS/tar-1.18-1.1mdv2008.0.src.rpm Mandriva (MDKSA-2007:233) Corporate Server 3.0 X86 corporate/3.0/i586/cpio-2.5-4.4.C30mdk.i586.rpm corporate/3.0/SRPMS/cpio-2.5-4.4.C30mdk.src.rpm X86_64 corporate/3.0/x86_64/cpio-2.5-4.4.C30mdk.x86_64.rpm corporate/3.0/SRPMS/cpio-2.5-4.4.C30mdk.src.rpm Multi Network Firewall 2.0 X86 ftp://ftp.cica.es/pub/Linux/Mandrakelinux/official/updates/mnf/2.0/i586/media/main/updates/cpio-2.5-4.4.M20mdk.i586.rpm ftp://ftp.cica.es/pub/Linux/Mandrakelinux/official/updates/mnf/2.0/SRPMS/main/updates/cpio-2.5-4.4.M20mdk.src.rpm Mandriva Linux 2007 X86 ftp://ftp.cica.es/pub/Linux/Mandrakelinux/official/updates/2007.0/i586/media/main/updates/cpio-2.6-7.1mdv2007.0.i586.rpm ftp://ftp.cica.es/pub/Linux/Mandrakelinux/official/updates/2007.0/SRPMS/main/updates/cpio-2.6-7.1mdv2007.0.src.rpm X86_64 ftp://ftp.cica.es/pub/Linux/Mandrakelinux/official/updates/2007.0/x86_64/media/main/updates/cpio-2.6-7.1mdv2007.0.x86_64.rpm ftp://ftp.cica.es/pub/Linux/Mandrakelinux/official/updates/2007.0/SRPMS/main/updates/cpio-2.6-7.1mdv2007.0.src.rpm Corporate Server 4.0 X86 corporate/4.0/i586/cpio-2.6-5.1.20060mlcs4.i586.rpm corporate/4.0/SRPMS/cpio-2.6-5.1.20060mlcs4.src.rpm X86_64 corporate/4.0/x86_64/cpio-2.6-5.1.20060mlcs4.x86_64.rpm corporate/4.0/SRPMS/cpio-2.6-5.1.20060mlcs4.src.rpm Mandriva Linux 2007.1 X86 ftp://ftp.cica.es/pub/Linux/Mandrakelinux/official/updates/2007.1/i586/media/main/updates/cpio-2.7-3.1mdv2007.1.i586.rpm ftp://ftp.cica.es/pub/Linux/Mandrakelinux/official/updates/2007.1/SRPMS/main/updates/cpio-2.7-3.1mdv2007.1.src.rpm X86_64 ftp://ftp.cica.es/pub/Linux/Mandrakelinux/official/updates/2007.1/x86_64/media/main/updates/cpio-2.7-3.1mdv2007.1.x86_64.rpm ftp://ftp.cica.es/pub/Linux/Mandrakelinux/official/updates/2007.1/SRPMS/main/updates/cpio-2.7-3.1mdv2007.1.src.rpm Mandriva Linux 2008.0 X86 ftp://ftp.cica.es/pub/Linux/Mandrakelinux/official/updates/2008.0/i586/media/main/updates/cpio-2.9-2.1mdv2008.0.i586.rpm ftp://ftp.cica.es/pub/Linux/Mandrakelinux/official/updates/2008.0/SRPMS/main/updates/cpio-2.9-2.1mdv2008.0.src.rpm X86_64 ftp://ftp.cica.es/pub/Linux/Mandrakelinux/official/updates/2008.0/x86_64/media/main/updates/cpio-2.9-2.1mdv2008.0.x86_64.rpm ftp://ftp.cica.es/pub/Linux/Mandrakelinux/official/updates/2008.0/SRPMS/main/updates/cpio-2.9-2.1mdv2008.0.src.rpm Mandriva (MDKSA-2007:240) Mandriva Linux 2007 X86 ftp://ftp.cica.es/pub/Linux/Mandrakelinux/official/updates/2007.0/i586/media/main/updates/libnfsidmap0-0.17-1.1mdv2007.0.i586.rpm ftp://ftp.cica.es/pub/Linux/Mandrakelinux/official/updates/2007.0/i586/media/main/updates/libnfsidmap0-devel-0.17-1.1mdv2007.0.i586.rpm ftp://ftp.cica.es/pub/Linux/Mandrakelinux/official/updates/2007.0/SRPMS/main/updates/libnfsidmap-0.17-1.1mdv2007.0.src.rpm X86_64 ftp://ftp.cica.es/pub/Linux/Mandrakelinux/official/updates/2007.0/x86_64/media/main/updates/lib64nfsidmap0-0.17-1.1mdv2007.0.x86_64.rpm ftp://ftp.cica.es/pub/Linux/Mandrakelinux/official/updates/2007.0/x86_64/media/main/updates/lib64nfsidmap0-devel-0.17-1.1mdv2007.0.x86_64.rpm ftp://ftp.cica.es/pub/Linux/Mandrakelinux/official/updates/2007.0/SRPMS/main/updates/libnfsidmap-0.17-1.1mdv2007.0.src.rpm Corporate Server 4.0 X86 corporate/4.0/i586/libnfsidmap0-0.17-0.1.20060mlcs4.i586.rpm corporate/4.0/i586/libnfsidmap0-devel-0.17-0.1.20060mlcs4.i586.rpm corporate/4.0/SRPMS/libnfsidmap-0.17-0.1.20060mlcs4.src.rpm X86_64 corporate/4.0/x86_64/lib64nfsidmap0-0.17-0.1.20060mlcs4.x86_64.rpm corporate/4.0/x86_64/lib64nfsidmap0-devel-0.17-0.1.20060mlcs4.x86_64.rpm corporate/4.0/SRPMS/libnfsidmap-0.17-0.1.20060mlcs4.src.rpm Debian (DSA 1438-1) Debian Linux 3.1 Source http://security.debian.org/pool/updates/main/t/tar/tar_1.14.orig.tar.gz http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4.dsc http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4.diff.gz alpha http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4_alpha.deb amd64 http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4_amd64.deb arm http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4_arm.deb hppa http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4_hppa.deb i386 http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4_i386.deb ia64 http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4_ia64.deb m68k http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4_m68k.deb mips http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4_mips.deb mipsel http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4_mipsel.deb powerpc http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4_powerpc.deb s390 http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4_s390.deb sparc http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4_sparc.deb Debian Linux 4.0 Source http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1.diff.gz http://security.debian.org/pool/updates/main/t/tar/tar_1.16.orig.tar.gz http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1.dsc alpha http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1_alpha.deb amd64 http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1_amd64.deb arm http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1_arm.deb hppa http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1_hppa.deb i386 http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1_i386.deb ia64 http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1_ia64.deb mips http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1_mips.deb mipsel http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1_mipsel.deb powerpc http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1_powerpc.deb s390 http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1_s390.deb sparc http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1_sparc.deb Debian (DSA-1566-1) Debian Linux 4.0 Source http://security.debian.org/pool/updates/main/c/cpio/cpio_2.6.orig.tar.gz http://security.debian.org/pool/updates/main/c/cpio/cpio_2.6-18.1+etch1.dsc http://security.debian.org/pool/updates/main/c/cpio/cpio_2.6-18.1+etch1.diff.gz alpha (DEC Alpha) http://security.debian.org/pool/updates/main/c/cpio/cpio_2.6-18.1+etch1_alpha.deb amd64 (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/c/cpio/cpio_2.6-18.1+etch1_amd64.deb arm (ARM) http://security.debian.org/pool/updates/main/c/cpio/cpio_2.6-18.1+etch1_arm.deb hppa (HP PA RISC) http://security.debian.org/pool/updates/main/c/cpio/cpio_2.6-18.1+etch1_hppa.deb i386 (Intel ia32) http://security.debian.org/pool/updates/main/c/cpio/cpio_2.6-18.1+etch1_i386.deb ia64 (Intel ia64) http://security.debian.org/pool/updates/main/c/cpio/cpio_2.6-18.1+etch1_ia64.deb mips (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/c/cpio/cpio_2.6-18.1+etch1_mips.deb mipsel (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/c/cpio/cpio_2.6-18.1+etch1_mipsel.deb powerpc (PowerPC) http://security.debian.org/pool/updates/main/c/cpio/cpio_2.6-18.1+etch1_powerpc.deb s390 (IBM S/390) http://security.debian.org/pool/updates/main/c/cpio/cpio_2.6-18.1+etch1_s390.deb sparc (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/c/cpio/cpio_2.6-18.1+etch1_sparc.deb |
|
Identificadores estándar |
|
Propiedad | Valor |
CVE |
CVE-2007-2956 CVE-2007-4135 CVE-2007-4476 CVE-2007-4510 CVE-2007-4560 |
BID |
25398 25439 |
Recursos adicionales |
|
SUSE Security Summary Report (SUSE-SR:2007:018) http://www.novell.com/linux/security/advisories/2007_18_sr.html Debian Security Advisory (DSA 1366-1) http://lists.debian.org/debian-security-announce/debian-security-announce-2007/msg00127.html Mandriva Security Advisory (MDKSA-2007:172) http://www.mandriva.com/security/advisories?name=MDKSA-2007:172 Red Hat Security Advisory (RHSA-2007:0951-2) https://rhn.redhat.com/errata/RHSA-2007-0951.html Mandriva Security Advisory (MDKSA-2007:197) http://www.mandriva.com/security/advisories?name=MDKSA-2007:197 Mandriva Security Advisory (MDKSA-2007:233) http://www.mandriva.com/security/advisories?name=MDKSA-2007:233 Mandriva Security Advisory (MDKSA-2007:240) http://www.mandriva.com/security/advisories?name=MDKSA-2007:240 Debian Security Advisory (DSA 1438-1) http://lists.debian.org/debian-security-announce/debian-security-announce-2007/msg00221.html Debian Security Advisory (DSA-1566-1) http://lists.debian.org/debian-security-announce/2008/msg00140.html |
Histórico de versiones |
||
Versión | Comentario | Fecha |
1.0 | Aviso emitido | 2007-09-03 |
1.1 | Aviso emitido por Red Hat (RHSA-2007:0951-2) | 2007-10-03 |
1.2 | Aviso emitido por Mandriva (MDKSA-2007:197) | 2007-10-22 |
1.3 | Aviso emitido por Mandriva (MDKSA-2007:233) | 2007-11-29 |
1.4 | Aviso emitido por Mandriva (MDKSA-2007:240) | 2007-12-12 |
1.5 | Aviso emitido por Debian (DSA 1438-1) | 2008-01-03 |
1.6 | Aviso emitido por Debian (DSA-1566-1) | 2008-05-13 |
1.7 | Aviso emitido por Sun (273551) | 2010-03-12 |
1.8 | Aviso emitido por Red Hat (RHSA-2010:0141-1), aviso emitido por Red Hat (RHSA-2010:0144-1) | 2010-03-16 |