Lucene search

K
mageiaGentoo FoundationMGASA-2014-0528
HistoryDec 14, 2014 - 5:10 p.m.

Updated cpio package fixes security vulnerability

2014-12-1417:10:39
Gentoo Foundation
advisories.mageia.org
23

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

EPSS

0.016

Percentile

87.6%

Heap-based buffer overflow in the process_copy_in function in GNU Cpio 2.11 allows remote attackers to cause a denial of service via a large block value in a cpio archive (CVE-2014-9112). Additionally, a null pointer dereference in the copyin_link function which could cause a denial of service has also been fixed.

OSVersionArchitecturePackageVersionFilename
Mageia4noarchcpio< 2.11-6.2cpio-2.11-6.2.mga4

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

EPSS

0.016

Percentile

87.6%