Lucene search

K
centosCentOS ProjectCESA-2005:378
HistoryJul 21, 2005 - 7:16 p.m.

cpio security update

2005-07-2119:16:30
CentOS Project
lists.centos.org
51

CVSS2

3.7

Attack Vector

LOCAL

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:H/Au:N/C:P/I:P/A:P

CVSS3

4.7

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N

EPSS

0

Percentile

15.7%

CentOS Errata and Security Advisory CESA-2005:378

GNU cpio copies files into or out of a cpio or tar archive.

A race condition bug was found in cpio. It is possible for a local
malicious user to modify the permissions of a local file if they have write
access to a directory in which a cpio archive is being extracted. The
Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the name CAN-2005-1111 to this issue.

Additionally, this update adds cpio support for archives larger than 2GB.
However, the size of individual files within an archive is limited to 4GB.

All users of cpio are advised to upgrade to this updated package, which
contains backported fixes for these issues.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2005-July/074100.html
https://lists.centos.org/pipermail/centos-announce/2005-July/074101.html
https://lists.centos.org/pipermail/centos-announce/2005-July/074102.html
https://lists.centos.org/pipermail/centos-announce/2005-July/074105.html
https://lists.centos.org/pipermail/centos-announce/2005-July/074106.html
https://lists.centos.org/pipermail/centos-announce/2005-July/074115.html
https://lists.centos.org/pipermail/centos-announce/2005-July/074116.html
https://lists.centos.org/pipermail/centos-announce/2005-July/086866.html
https://lists.centos.org/pipermail/centos-announce/2005-July/086867.html

Affected packages:
cpio

Upstream details at:
https://access.redhat.com/errata/RHSA-2005:378

CVSS2

3.7

Attack Vector

LOCAL

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:H/Au:N/C:P/I:P/A:P

CVSS3

4.7

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N

EPSS

0

Percentile

15.7%