Abrir sesión
logo

DEFENSA FRENTE A LAS CIBERAMENAZAS

barra-separadora

Soporte de vulnerabilidades

Servicio de soporte de vulnerabilidadesAnálisis, notificación y seguimiento de aquellas vulnerabilidades más críticas, que impactan especialmente en las tecnologías empleadas en el sector público. El CCN-CERT trabajará en la recopilación y clasificación de las nuevas vulnerabilidades, realizando un análisis teórico y en laboratorio, cuando sea posible, de aquellas que por su criticidad lo requieran.

Se generarán documentos informativos o “abstracts” de dichas vulnerabilidades y se llevará a cabo un seguimiento de la evolución de la vulnerabilidad en Internet, alertando a los organismos ante cambios en la criticidad, aparición de parches, nuevas recomendaciones, constancia de explotaciones activas, etc.

Para inscribirse en este servicio o recibir más información, escribir al correo electrónico: soporte_acreditacion@ccn.cni.es

Abstracts:


Boletines de Vulnerabilidades


Múltiples vulnerabilidades en el kernel de Linux

Clasificación de la vulnerabilidad

Propiedad Valor
Nivel de Confianza Oficial
Impacto Obtener acceso
Dificultad Experto
Requerimientos del atacante Acceso remoto sin cuenta a un servicio estandar

Información sobre el sistema

Propiedad Valor
Fabricante afectado GNU/Linux
Software afectado Linux kernel

Descripción

Se han encontrado múltiples vulnerabilidades en el kernel de Linux. Las vulnerabilidades son descritas a continuación.

- CVE-2007-2956: Se ha encontrado una vulnerabilidad del tipo desbordamiento de búfer en pfstools 1.6.2 en los archivos src/fileformat/rgbeio.cpp y en Qtpfsgui 1.8.11 en los archivos src/Fileformat/rgbeio.cpp. La vulnerabilidad reside en un error en la función readRadianceHeader. Un atacante remoto podría ejecutar código arbitrario mediante un archivo Radiance RGBE especialmente diseñado.

- CVE-2007-4135: Se ha encontrado una vulnerabilidad en el NFSv4 ID mapper. La vulnerabilidad reside en un error en la traducción de nombre a uid. La vulnerabilidad podría provocar resoluciones de nombres NFSv4 incorrectas.

- CVE-2007-4476: Se ha encontrado una vulnerabilidad en GNU tar. La vulnerabilidad reside en un error en la función safer_name_suffix().Se desconoce el impacto de dicha vulnerabilidad así como sus métodos de ataque.

- CVE-2007-4510: Se ha encontrado una vulnerabilidad en ClamAV en las versiones anteriores a la 0.91.2 en los archivos libclamav/rtf.c y libclamav/htmlnorm.c. La vulnerabilidad reside en una referencia nula en las funciones cli_scanrtf y cli_html_normalise. Un atacante remoto podría causar una denegación de servicio mediante un archivo RTF especialmente diseñado o un documento HTML especialmente diseñado con una URI "data:".

- CVE-2007-4560: Se ha encontrado una vulnerabilidad en ClamAV en las versiones anteriores a la 0.91.2. La vulnerabilidad se da cuando es ejecutado en modo black hole. Un atacante remoto podría ejecutar comandos arbitrarios mediante metacaracteres shell que son utilizados en ciertas llamadas popen.

Solución



Actualización de software

Suse Linux
Las actualizaciones pueden descargarse mediante YAST o del servidor FTP oficial de Suse Linux.

Debian (DSA 1366-1)

Debian Linux 4.0
Source
http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1-3etch7.dsc
http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1-3etch7.diff.gz
http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1.orig.tar.gz
Architecture independent
http://security.debian.org/pool/updates/main/c/clamav/clamav-base_0.90.1-3etch7_all.deb
http://security.debian.org/pool/updates/main/c/clamav/clamav-docs_0.90.1-3etch7_all.deb
http://security.debian.org/pool/updates/main/c/clamav/clamav-testfiles_0.90.1-3etch7_all.deb
Alpha
http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1-3etch7_alpha.deb
http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.90.1-3etch7_alpha.deb
http://security.debian.org/pool/updates/main/c/clamav/clamav-dbg_0.90.1-3etch7_alpha.deb
http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.90.1-3etch7_alpha.deb
http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.90.1-3etch7_alpha.deb
http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.90.1-3etch7_alpha.deb
http://security.debian.org/pool/updates/main/c/clamav/libclamav2_0.90.1-3etch7_alpha.deb
AMD64
http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1-3etch7_amd64.deb
http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.90.1-3etch7_amd64.deb
http://security.debian.org/pool/updates/main/c/clamav/clamav-dbg_0.90.1-3etch7_amd64.deb
http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.90.1-3etch7_amd64.deb
http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.90.1-3etch7_amd64.deb
http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.90.1-3etch7_amd64.deb
http://security.debian.org/pool/updates/main/c/clamav/libclamav2_0.90.1-3etch7_amd64.deb
ARM
http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1-3etch7_arm.deb
http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.90.1-3etch7_arm.deb
http://security.debian.org/pool/updates/main/c/clamav/clamav-dbg_0.90.1-3etch7_arm.deb
http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.90.1-3etch7_arm.deb
http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.90.1-3etch7_arm.deb
http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.90.1-3etch7_arm.deb
http://security.debian.org/pool/updates/main/c/clamav/libclamav2_0.90.1-3etch7_arm.deb
HP Precision
http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1-3etch7_hppa.deb
http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.90.1-3etch7_hppa.deb
http://security.debian.org/pool/updates/main/c/clamav/clamav-dbg_0.90.1-3etch7_hppa.deb
http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.90.1-3etch7_hppa.deb
http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.90.1-3etch7_hppa.deb
http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.90.1-3etch7_hppa.deb
http://security.debian.org/pool/updates/main/c/clamav/libclamav2_0.90.1-3etch7_hppa.deb
Intel IA-32
http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1-3etch7_i386.deb
http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.90.1-3etch7_i386.deb
http://security.debian.org/pool/updates/main/c/clamav/clamav-dbg_0.90.1-3etch7_i386.deb
http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.90.1-3etch7_i386.deb
http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.90.1-3etch7_i386.deb
http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.90.1-3etch7_i386.deb
http://security.debian.org/pool/updates/main/c/clamav/libclamav2_0.90.1-3etch7_i386.deb
Intel IA-64
http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1-3etch7_ia64.deb
http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.90.1-3etch7_ia64.deb
http://security.debian.org/pool/updates/main/c/clamav/clamav-dbg_0.90.1-3etch7_ia64.deb
http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.90.1-3etch7_ia64.deb
http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.90.1-3etch7_ia64.deb
http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.90.1-3etch7_ia64.deb
http://security.debian.org/pool/updates/main/c/clamav/libclamav2_0.90.1-3etch7_ia64.deb
Big endian MIPS
http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1-3etch7_mips.deb
http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.90.1-3etch7_mips.deb
http://security.debian.org/pool/updates/main/c/clamav/clamav-dbg_0.90.1-3etch7_mips.deb
http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.90.1-3etch7_mips.deb
http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.90.1-3etch7_mips.deb
http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.90.1-3etch7_mips.deb
http://security.debian.org/pool/updates/main/c/clamav/libclamav2_0.90.1-3etch7_mips.deb
Little endian MIPS
http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1-3etch7_mipsel.deb
http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.90.1-3etch7_mipsel.deb
http://security.debian.org/pool/updates/main/c/clamav/clamav-dbg_0.90.1-3etch7_mipsel.deb
http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.90.1-3etch7_mipsel.deb
http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.90.1-3etch7_mipsel.deb
http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.90.1-3etch7_mipsel.deb
http://security.debian.org/pool/updates/main/c/clamav/libclamav2_0.90.1-3etch7_mipsel.deb
PowerPC
http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1-3etch7_powerpc.deb
http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.90.1-3etch7_powerpc.deb
http://security.debian.org/pool/updates/main/c/clamav/clamav-dbg_0.90.1-3etch7_powerpc.deb
http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.90.1-3etch7_powerpc.deb
http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.90.1-3etch7_powerpc.deb
http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.90.1-3etch7_powerpc.deb
http://security.debian.org/pool/updates/main/c/clamav/libclamav2_0.90.1-3etch7_powerpc.deb
IBM S/390
http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1-3etch7_s390.deb
http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.90.1-3etch7_s390.deb
http://security.debian.org/pool/updates/main/c/clamav/clamav-dbg_0.90.1-3etch7_s390.deb
http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.90.1-3etch7_s390.deb
http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.90.1-3etch7_s390.deb
http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.90.1-3etch7_s390.deb
http://security.debian.org/pool/updates/main/c/clamav/libclamav2_0.90.1-3etch7_s390.deb
Sun Sparc
http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1-3etch7_sparc.deb
http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.90.1-3etch7_sparc.deb
http://security.debian.org/pool/updates/main/c/clamav/clamav-dbg_0.90.1-3etch7_sparc.deb
http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.90.1-3etch7_sparc.deb
http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.90.1-3etch7_sparc.deb
http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.90.1-3etch7_sparc.deb
http://security.debian.org/pool/updates/main/c/clamav/libclamav2_0.90.1-3etch7_sparc.deb

Mandriva (MDKSA-2007:172)

Corporate Server 3.0
X86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/i586/clamav-0.91.2-0.1.C30mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/i586/clamav-db-0.91.2-0.1.C30mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/i586/clamav-milter-0.91.2-0.1.C30mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/i586/clamd-0.91.2-0.1.C30mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/i586/clamdmon-0.91.2-0.1.C30mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/i586/libclamav-devel-0.91.2-0.1.C30mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/i586/libclamav2-0.91.2-0.1.C30mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/SRPMS/clamav-0.91.2-0.1.C30mdk.src.rpm
X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/x86_64/clamav-0.91.2-0.1.C30mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/x86_64/clamav-db-0.91.2-0.1.C30mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/x86_64/clamav-milter-0.91.2-0.1.C30mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/x86_64/clamd-0.91.2-0.1.C30mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/x86_64/clamdmon-0.91.2-0.1.C30mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/x86_64/lib64clamav-devel-0.91.2-0.1.C30mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/x86_64/lib64clamav2-0.91.2-0.1.C30mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/SRPMS/clamav-0.91.2-0.1.C30mdk.src.rpm

Mandriva Linux 2007
X86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/i586/clamav-0.91.2-1.1mdv2007.0.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/i586/clamav-db-0.91.2-1.1mdv2007.0.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/i586/clamav-milter-0.91.2-1.1mdv2007.0.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/i586/clamd-0.91.2-1.1mdv2007.0.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/i586/clamdmon-0.91.2-1.1mdv2007.0.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/i586/libclamav-devel-0.91.2-1.1mdv2007.0.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/i586/libclamav2-0.91.2-1.1mdv2007.0.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/SRPMS/clamav-0.91.2-1.1mdv2007.0.src.rpm
X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/x86_64/clamav-0.91.2-1.1mdv2007.0.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/x86_64/clamav-db-0.91.2-1.1mdv2007.0.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/x86_64/clamav-milter-0.91.2-1.1mdv2007.0.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/x86_64/clamd-0.91.2-1.1mdv2007.0.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/x86_64/clamdmon-0.91.2-1.1mdv2007.0.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/x86_64/lib64clamav-devel-0.91.2-1.1mdv2007.0.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/x86_64/lib64clamav2-0.91.2-1.1mdv2007.0.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/SRPMS/clamav-0.91.2-1.1mdv2007.0.src.rpm

Corporate Server 4.0
X86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/i586/clamav-0.91.2-0.1.20060mlcs4.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/i586/clamav-db-0.91.2-0.1.20060mlcs4.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/i586/clamav-milter-0.91.2-0.1.20060mlcs4.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/i586/clamd-0.91.2-0.1.20060mlcs4.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/i586/clamdmon-0.91.2-0.1.20060mlcs4.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/i586/libclamav-devel-0.91.2-0.1.20060mlcs4.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/i586/libclamav2-0.91.2-0.1.20060mlcs4.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/SRPMS/clamav-0.91.2-0.1.20060mlcs4.src.rpm
X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/x86_64/clamav-0.91.2-0.1.20060mlcs4.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/x86_64/clamav-db-0.91.2-0.1.20060mlcs4.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/x86_64/clamav-milter-0.91.2-0.1.20060mlcs4.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/x86_64/clamd-0.91.2-0.1.20060mlcs4.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/x86_64/clamdmon-0.91.2-0.1.20060mlcs4.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/x86_64/lib64clamav-devel-0.91.2-0.1.20060mlcs4.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/x86_64/lib64clamav2-0.91.2-0.1.20060mlcs4.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/SRPMS/clamav-0.91.2-0.1.20060mlcs4.src.rpm

Mandriva Linux 2007.1
X86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.1/i586/clamav-0.91.2-1.1mdv2007.1.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.1/i586/clamav-db-0.91.2-1.1mdv2007.1.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.1/i586/clamav-milter-0.91.2-1.1mdv2007.1.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.1/i586/clamd-0.91.2-1.1mdv2007.1.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.1/i586/clamdmon-0.91.2-1.1mdv2007.1.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.1/i586/libclamav-devel-0.91.2-1.1mdv2007.1.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.1/i586/libclamav2-0.91.2-1.1mdv2007.1.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.1/SRPMS/clamav-0.91.2-1.1mdv2007.1.src.rpm
X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.1/x86_64/clamav-0.91.2-1.1mdv2007.1.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.1/x86_64/clamav-db-0.91.2-1.1mdv2007.1.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.1/x86_64/clamav-milter-0.91.2-1.1mdv2007.1.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.1/x86_64/clamd-0.91.2-1.1mdv2007.1.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.1/x86_64/clamdmon-0.91.2-1.1mdv2007.1.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.1/x86_64/lib64clamav-devel-0.91.2-1.1mdv2007.1.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.1/x86_64/lib64clamav2-0.91.2-1.1mdv2007.1.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.1/SRPMS/clamav-0.91.2-1.1mdv2007.1.src.rpm

Red Hat (RHSA-2007:0951-2)
RHEL Desktop Workstation (v. 5 client)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
https://rhn.redhat.com/

Mandriva (MDKSA-2007:197)

Mandriva Linux 2007
X86
2007.0/i586/tar-1.15.91-1.3mdv2007.0.i586.rpm
2007.0/SRPMS/tar-1.15.91-1.3mdv2007.0.src.rpm
X86_64
2007.0/x86_64/tar-1.15.91-1.3mdv2007.0.x86_64.rpm
2007.0/SRPMS/tar-1.15.91-1.3mdv2007.0.src.rpm

Corporate Server 4.0
X86
corporate/4.0/i586/tar-1.15.1-5.4.20060mlcs4.i586.rpm
corporate/4.0/SRPMS/tar-1.15.1-5.4.20060mlcs4.src.rpm
X86_64
corporate/4.0/x86_64/tar-1.15.1-5.4.20060mlcs4.x86_64.rpm
corporate/4.0/SRPMS/tar-1.15.1-5.4.20060mlcs4.src.rpm

Mandriva Linux 2007.1
X86
2007.1/i586/tar-1.16-3.2mdv2007.1.i586.rpm
2007.1/SRPMS/tar-1.16-3.2mdv2007.1.src.rpm
X86_64
2007.1/x86_64/tar-1.16-3.2mdv2007.1.x86_64.rpm
2007.1/SRPMS/tar-1.16-3.2mdv2007.1.src.rpm

Mandriva Linux 2008.0
X86
2008.0/i586/tar-1.18-1.1mdv2008.0.i586.rpm
2008.0/SRPMS/tar-1.18-1.1mdv2008.0.src.rpm
X86_64
2008.0/x86_64/tar-1.18-1.1mdv2008.0.x86_64.rpm
2008.0/SRPMS/tar-1.18-1.1mdv2008.0.src.rpm

Mandriva (MDKSA-2007:233)

Corporate Server 3.0
X86
corporate/3.0/i586/cpio-2.5-4.4.C30mdk.i586.rpm
corporate/3.0/SRPMS/cpio-2.5-4.4.C30mdk.src.rpm
X86_64
corporate/3.0/x86_64/cpio-2.5-4.4.C30mdk.x86_64.rpm
corporate/3.0/SRPMS/cpio-2.5-4.4.C30mdk.src.rpm

Multi Network Firewall 2.0
X86
ftp://ftp.cica.es/pub/Linux/Mandrakelinux/official/updates/mnf/2.0/i586/media/main/updates/cpio-2.5-4.4.M20mdk.i586.rpm
ftp://ftp.cica.es/pub/Linux/Mandrakelinux/official/updates/mnf/2.0/SRPMS/main/updates/cpio-2.5-4.4.M20mdk.src.rpm

Mandriva Linux 2007
X86
ftp://ftp.cica.es/pub/Linux/Mandrakelinux/official/updates/2007.0/i586/media/main/updates/cpio-2.6-7.1mdv2007.0.i586.rpm
ftp://ftp.cica.es/pub/Linux/Mandrakelinux/official/updates/2007.0/SRPMS/main/updates/cpio-2.6-7.1mdv2007.0.src.rpm
X86_64
ftp://ftp.cica.es/pub/Linux/Mandrakelinux/official/updates/2007.0/x86_64/media/main/updates/cpio-2.6-7.1mdv2007.0.x86_64.rpm
ftp://ftp.cica.es/pub/Linux/Mandrakelinux/official/updates/2007.0/SRPMS/main/updates/cpio-2.6-7.1mdv2007.0.src.rpm

Corporate Server 4.0
X86
corporate/4.0/i586/cpio-2.6-5.1.20060mlcs4.i586.rpm
corporate/4.0/SRPMS/cpio-2.6-5.1.20060mlcs4.src.rpm
X86_64
corporate/4.0/x86_64/cpio-2.6-5.1.20060mlcs4.x86_64.rpm
corporate/4.0/SRPMS/cpio-2.6-5.1.20060mlcs4.src.rpm

Mandriva Linux 2007.1
X86
ftp://ftp.cica.es/pub/Linux/Mandrakelinux/official/updates/2007.1/i586/media/main/updates/cpio-2.7-3.1mdv2007.1.i586.rpm
ftp://ftp.cica.es/pub/Linux/Mandrakelinux/official/updates/2007.1/SRPMS/main/updates/cpio-2.7-3.1mdv2007.1.src.rpm
X86_64
ftp://ftp.cica.es/pub/Linux/Mandrakelinux/official/updates/2007.1/x86_64/media/main/updates/cpio-2.7-3.1mdv2007.1.x86_64.rpm
ftp://ftp.cica.es/pub/Linux/Mandrakelinux/official/updates/2007.1/SRPMS/main/updates/cpio-2.7-3.1mdv2007.1.src.rpm

Mandriva Linux 2008.0
X86
ftp://ftp.cica.es/pub/Linux/Mandrakelinux/official/updates/2008.0/i586/media/main/updates/cpio-2.9-2.1mdv2008.0.i586.rpm
ftp://ftp.cica.es/pub/Linux/Mandrakelinux/official/updates/2008.0/SRPMS/main/updates/cpio-2.9-2.1mdv2008.0.src.rpm
X86_64
ftp://ftp.cica.es/pub/Linux/Mandrakelinux/official/updates/2008.0/x86_64/media/main/updates/cpio-2.9-2.1mdv2008.0.x86_64.rpm
ftp://ftp.cica.es/pub/Linux/Mandrakelinux/official/updates/2008.0/SRPMS/main/updates/cpio-2.9-2.1mdv2008.0.src.rpm

Mandriva (MDKSA-2007:240)

Mandriva Linux 2007
X86
ftp://ftp.cica.es/pub/Linux/Mandrakelinux/official/updates/2007.0/i586/media/main/updates/libnfsidmap0-0.17-1.1mdv2007.0.i586.rpm
ftp://ftp.cica.es/pub/Linux/Mandrakelinux/official/updates/2007.0/i586/media/main/updates/libnfsidmap0-devel-0.17-1.1mdv2007.0.i586.rpm
ftp://ftp.cica.es/pub/Linux/Mandrakelinux/official/updates/2007.0/SRPMS/main/updates/libnfsidmap-0.17-1.1mdv2007.0.src.rpm
X86_64
ftp://ftp.cica.es/pub/Linux/Mandrakelinux/official/updates/2007.0/x86_64/media/main/updates/lib64nfsidmap0-0.17-1.1mdv2007.0.x86_64.rpm
ftp://ftp.cica.es/pub/Linux/Mandrakelinux/official/updates/2007.0/x86_64/media/main/updates/lib64nfsidmap0-devel-0.17-1.1mdv2007.0.x86_64.rpm
ftp://ftp.cica.es/pub/Linux/Mandrakelinux/official/updates/2007.0/SRPMS/main/updates/libnfsidmap-0.17-1.1mdv2007.0.src.rpm

Corporate Server 4.0
X86
corporate/4.0/i586/libnfsidmap0-0.17-0.1.20060mlcs4.i586.rpm
corporate/4.0/i586/libnfsidmap0-devel-0.17-0.1.20060mlcs4.i586.rpm
corporate/4.0/SRPMS/libnfsidmap-0.17-0.1.20060mlcs4.src.rpm
X86_64
corporate/4.0/x86_64/lib64nfsidmap0-0.17-0.1.20060mlcs4.x86_64.rpm
corporate/4.0/x86_64/lib64nfsidmap0-devel-0.17-0.1.20060mlcs4.x86_64.rpm
corporate/4.0/SRPMS/libnfsidmap-0.17-0.1.20060mlcs4.src.rpm

Debian (DSA 1438-1)

Debian Linux 3.1
Source
http://security.debian.org/pool/updates/main/t/tar/tar_1.14.orig.tar.gz
http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4.dsc
http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4.diff.gz
alpha
http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4_alpha.deb
amd64
http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4_amd64.deb
arm
http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4_arm.deb
hppa
http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4_hppa.deb
i386
http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4_i386.deb
ia64
http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4_ia64.deb
m68k
http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4_m68k.deb
mips
http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4_mips.deb
mipsel
http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4_mipsel.deb
powerpc
http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4_powerpc.deb
s390
http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4_s390.deb
sparc
http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4_sparc.deb

Debian Linux 4.0
Source
http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1.diff.gz
http://security.debian.org/pool/updates/main/t/tar/tar_1.16.orig.tar.gz
http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1.dsc
alpha
http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1_alpha.deb
amd64
http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1_amd64.deb
arm
http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1_arm.deb
hppa
http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1_hppa.deb
i386
http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1_i386.deb
ia64
http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1_ia64.deb
mips
http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1_mips.deb
mipsel
http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1_mipsel.deb
powerpc
http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1_powerpc.deb
s390
http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1_s390.deb
sparc
http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1_sparc.deb

Debian (DSA-1566-1)

Debian Linux 4.0
Source
http://security.debian.org/pool/updates/main/c/cpio/cpio_2.6.orig.tar.gz
http://security.debian.org/pool/updates/main/c/cpio/cpio_2.6-18.1+etch1.dsc
http://security.debian.org/pool/updates/main/c/cpio/cpio_2.6-18.1+etch1.diff.gz
alpha (DEC Alpha)
http://security.debian.org/pool/updates/main/c/cpio/cpio_2.6-18.1+etch1_alpha.deb
amd64 (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/c/cpio/cpio_2.6-18.1+etch1_amd64.deb
arm (ARM)
http://security.debian.org/pool/updates/main/c/cpio/cpio_2.6-18.1+etch1_arm.deb
hppa (HP PA RISC)
http://security.debian.org/pool/updates/main/c/cpio/cpio_2.6-18.1+etch1_hppa.deb
i386 (Intel ia32)
http://security.debian.org/pool/updates/main/c/cpio/cpio_2.6-18.1+etch1_i386.deb
ia64 (Intel ia64)
http://security.debian.org/pool/updates/main/c/cpio/cpio_2.6-18.1+etch1_ia64.deb
mips (MIPS (Big Endian))
http://security.debian.org/pool/updates/main/c/cpio/cpio_2.6-18.1+etch1_mips.deb
mipsel (MIPS (Little Endian))
http://security.debian.org/pool/updates/main/c/cpio/cpio_2.6-18.1+etch1_mipsel.deb
powerpc (PowerPC)
http://security.debian.org/pool/updates/main/c/cpio/cpio_2.6-18.1+etch1_powerpc.deb
s390 (IBM S/390)
http://security.debian.org/pool/updates/main/c/cpio/cpio_2.6-18.1+etch1_s390.deb
sparc (Sun SPARC/UltraSPARC)
http://security.debian.org/pool/updates/main/c/cpio/cpio_2.6-18.1+etch1_sparc.deb

Identificadores estándar

Propiedad Valor
CVE CVE-2007-2956
CVE-2007-4135
CVE-2007-4476
CVE-2007-4510
CVE-2007-4560
BID 25398
25439

Recursos adicionales

SUSE Security Summary Report (SUSE-SR:2007:018)
http://www.novell.com/linux/security/advisories/2007_18_sr.html

Debian Security Advisory (DSA 1366-1)
http://lists.debian.org/debian-security-announce/debian-security-announce-2007/msg00127.html

Mandriva Security Advisory (MDKSA-2007:172)
http://www.mandriva.com/security/advisories?name=MDKSA-2007:172

Red Hat Security Advisory (RHSA-2007:0951-2)
https://rhn.redhat.com/errata/RHSA-2007-0951.html

Mandriva Security Advisory (MDKSA-2007:197)
http://www.mandriva.com/security/advisories?name=MDKSA-2007:197

Mandriva Security Advisory (MDKSA-2007:233)
http://www.mandriva.com/security/advisories?name=MDKSA-2007:233

Mandriva Security Advisory (MDKSA-2007:240)
http://www.mandriva.com/security/advisories?name=MDKSA-2007:240

Debian Security Advisory (DSA 1438-1)
http://lists.debian.org/debian-security-announce/debian-security-announce-2007/msg00221.html

Debian Security Advisory (DSA-1566-1)
http://lists.debian.org/debian-security-announce/2008/msg00140.html

Histórico de versiones

Versión Comentario Fecha
1.0 Aviso emitido 2007-09-03
1.1 Aviso emitido por Red Hat (RHSA-2007:0951-2) 2007-10-03
1.2 Aviso emitido por Mandriva (MDKSA-2007:197) 2007-10-22
1.3 Aviso emitido por Mandriva (MDKSA-2007:233) 2007-11-29
1.4 Aviso emitido por Mandriva (MDKSA-2007:240) 2007-12-12
1.5 Aviso emitido por Debian (DSA 1438-1) 2008-01-03
1.6 Aviso emitido por Debian (DSA-1566-1) 2008-05-13
1.7 Aviso emitido por Sun (273551) 2010-03-12
1.8 Aviso emitido por Red Hat (RHSA-2010:0141-1), aviso emitido por Red Hat (RHSA-2010:0144-1) 2010-03-16
Volver

Este sitio web utiliza cookies propias y de terceros para el correcto funcionamiento y visualización del sitio web por parte del usuario, así como la recogida de estadísticas. Si continúa navegando, consideramos que acepta su uso. Puede cambiar la configuración u obtener más información. Modificar configuración