Name | CVE-2016-6321 |
Description | Directory traversal vulnerability in the safer_name_suffix function in GNU tar 1.14 through 1.29 might allow remote attackers to bypass an intended protection mechanism and write to arbitrary files via vectors related to improper sanitization of the file_name parameter, aka POINTYFEATHER. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-690-1, DSA-3702-1 |
Debian Bugs | 842339 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
tar (PTS) | jessie, jessie (lts) | 1.27.1-2+deb8u2 | fixed |
| stretch (security), stretch (lts), stretch | 1.29b-1.1+deb9u1 | fixed |
| buster (security), buster, buster (lts) | 1.30+dfsg-6+deb10u1 | fixed |
| bullseye | 1.34+dfsg-1+deb11u1 | fixed |
| bookworm | 1.34+dfsg-1.2+deb12u1 | fixed |
| sid, trixie | 1.35+dfsg-3 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
tar | source | wheezy | 1.26+dfsg-0.1+deb7u1 | | DLA-690-1 | |
tar | source | jessie | 1.27.1-2+deb8u1 | | DSA-3702-1 | |
tar | source | (unstable) | 1.29b-1.1 | | | 842339 |
Notes
https://sintonen.fi/advisories/tar-extract-pathname-bypass.txt
POC in https://sintonen.fi/advisories/tar-poc.tar (etc/shadow should not be extracted when asking for etc/motd)
Proposed patch by Antoine Beaupre: https://lists.debian.org/debian-lts/2016/10/msg00206.html
Proposed patch upstream: http://git.savannah.gnu.org/cgit/tar.git/commit/?id=7340f67b9860ea0531c1450e5aa261c50f67165d