CVE-2006-0300

NameCVE-2006-0300
DescriptionBuffer overflow in tar 1.14 through 1.15.90 allows user-assisted attackers to cause a denial of service (application crash) and possibly execute code via unspecified vectors involving PAX extended headers.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-987-1
Debian Bugs354091

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
dpkg (PTS)buster, buster (security)1.19.8fixed
bullseye1.20.13fixed
bullseye (security)1.20.10fixed
bookworm1.21.22fixed
trixie1.22.4fixed
sid1.22.6fixed
tar (PTS)buster1.30+dfsg-6fixed
buster (security)1.30+dfsg-6+deb10u1fixed
bullseye1.34+dfsg-1+deb11u1fixed
bookworm1.34+dfsg-1.2+deb12u1fixed
sid, trixie1.35+dfsg-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
dpkgsource(unstable)(not affected)
tarsourcewoody(not affected)
tarsourcesarge1.14-2.1DSA-987-1
tarsource(unstable)1.15.1-3high354091

Notes

- dpkg <not-affected> (has completely different tar implementation)

Search for package or bug name: Reporting problems