Lucene search

K
redhatRedHatRHSA-2007:0245
HistoryMay 01, 2007 - 12:00 a.m.

(RHSA-2007:0245) Low: cpio security and bug fix update

2007-05-0100:00:00
access.redhat.com
20

3.7 Low

CVSS2

Access Vector

LOCAL

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:H/Au:N/C:P/I:P/A:P

0.008 Low

EPSS

Percentile

79.8%

GNU cpio copies files into or out of a cpio or tar archive.

A buffer overflow was found in cpio on 64-bit platforms. By tricking a
user into adding a specially crafted large file to a cpio archive, a local
attacker may be able to exploit this flaw to execute arbitrary code with
the target user’s privileges. (CVE-2005-4268)

This erratum also addresses the following bugs:

  • cpio did not set exit codes appropriately.

  • cpio did not create a ram disk properly.

All users of cpio are advised to upgrade to this updated package, which
contains backported fixes to correct these issues.

3.7 Low

CVSS2

Access Vector

LOCAL

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:H/Au:N/C:P/I:P/A:P

0.008 Low

EPSS

Percentile

79.8%