Lucene search

K
centosCentOS ProjectCESA-2007:0245
HistoryMay 02, 2007 - 8:47 a.m.

cpio security update

2007-05-0208:47:25
CentOS Project
lists.centos.org
51

CVSS2

3.7

Attack Vector

LOCAL

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:H/Au:N/C:P/I:P/A:P

EPSS

0.007

Percentile

79.6%

CentOS Errata and Security Advisory CESA-2007:0245

GNU cpio copies files into or out of a cpio or tar archive.

A buffer overflow was found in cpio on 64-bit platforms. By tricking a
user into adding a specially crafted large file to a cpio archive, a local
attacker may be able to exploit this flaw to execute arbitrary code with
the target userโ€™s privileges. (CVE-2005-4268)

This erratum also addresses the following bugs:

  • cpio did not set exit codes appropriately.

  • cpio did not create a ram disk properly.

All users of cpio are advised to upgrade to this updated package, which
contains backported fixes to correct these issues.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2007-May/075863.html
https://lists.centos.org/pipermail/centos-announce/2007-May/088636.html

Affected packages:
cpio

Upstream details at:
https://access.redhat.com/errata/RHSA-2007:0245

OSVersionArchitecturePackageVersionFilename
CentOS4ia64cpio<ย 2.5-13.RHEL4cpio-2.5-13.RHEL4.ia64.rpm
CentOS4s390cpio<ย 2.5-13.RHEL4cpio-2.5-13.RHEL4.s390.rpm
CentOS4s390xcpio<ย 2.5-13.RHEL4cpio-2.5-13.RHEL4.s390x.rpm

CVSS2

3.7

Attack Vector

LOCAL

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:H/Au:N/C:P/I:P/A:P

EPSS

0.007

Percentile

79.6%