CVE-2006-0300

NameCVE-2006-0300
DescriptionBuffer overflow in tar 1.14 through 1.15.90 allows user-assisted attackers to cause a denial of service (application crash) and possibly execute code via unspecified vectors involving PAX extended headers.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-987-1
Debian Bugs354091

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
dpkg (PTS)jessie, jessie (lts)1.17.28fixed
stretch (security), stretch (lts), stretch1.18.26fixed
buster (security), buster, buster (lts)1.19.8fixed
bullseye1.20.13fixed
bullseye (security)1.20.10fixed
bookworm1.21.22fixed
sid, trixie1.22.11fixed
tar (PTS)jessie, jessie (lts)1.27.1-2+deb8u2fixed
stretch (security), stretch (lts), stretch1.29b-1.1+deb9u1fixed
buster (security), buster, buster (lts)1.30+dfsg-6+deb10u1fixed
bullseye1.34+dfsg-1+deb11u1fixed
bookworm1.34+dfsg-1.2+deb12u1fixed
sid, trixie1.35+dfsg-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
dpkgsource(unstable)(not affected)
tarsourcewoody(not affected)
tarsourcesarge1.14-2.1DSA-987-1
tarsource(unstable)1.15.1-3high354091

Notes

- dpkg <not-affected> (has completely different tar implementation)

Search for package or bug name: Reporting problems