Gentoo Archives: gentoo-announce

From: Kristian Fiskerstrand <k_f@g.o>
To: gentoo-announce@g.o
Subject: [gentoo-announce] [ GLSA 201502-11 ] GNU cpio: Multiple vulnerabilities
Date: Sun, 15 Feb 2015 14:53:42
Message-Id: 54E0AF44.5000403@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 201502-11
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: GNU cpio: Multiple vulnerabilities
9 Date: February 15, 2015
10 Bugs: #530512, #536010
11 ID: 201502-11
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 Two vulnerabilities have been found in GNU cpio, the worst of which
19 could result in execution of arbitrary code.
20
21 Background
22 ==========
23
24 GNU cpio copies files into or out of a cpio or tar archive.
25
26 Affected packages
27 =================
28
29 -------------------------------------------------------------------
30 Package / Vulnerable / Unaffected
31 -------------------------------------------------------------------
32 1 app-arch/cpio < 2.11-r3 >= 2.11-r3
33
34 Description
35 ===========
36
37 Two vulnerabilities have been discovered in GNU cpio:
38
39 * The list_file function in GNU cpio contains a heap-based buffer
40 overflow vulnerability (CVE-2014-9112)
41 * A directory traversal vulnerability has been found in GNU cpio
42 (CVE-2015-1197)
43
44 Impact
45 ======
46
47 A remote attacker may be able to entice a user to open a specially
48 crafted archive using GNU cpio, possibly resulting in execution of
49 arbitrary code, a Denial of Service condition, or overwriting arbitrary
50 files.
51
52 Workaround
53 ==========
54
55 There is no known workaround at this time.
56
57 Resolution
58 ==========
59
60 All GNU cpio users should upgrade to the latest version:
61
62 # emerge --sync
63 # emerge --ask --oneshot --verbose ">=app-arch/cpio-2.11-r3"
64
65 References
66 ==========
67
68 [ 1 ] CVE-2014-9112
69 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9112
70 [ 2 ] CVE-2015-1197
71 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1197
72
73 Availability
74 ============
75
76 This GLSA and any updates to it are available for viewing at
77 the Gentoo Security Website:
78
79 http://security.gentoo.org/glsa/glsa-201502-11.xml
80
81 Concerns?
82 =========
83
84 Security is a primary focus of Gentoo Linux and ensuring the
85 confidentiality and security of our users' machines is of utmost
86 importance to us. Any security concerns should be addressed to
87 security@g.o or alternatively, you may file a bug at
88 https://bugs.gentoo.org.
89
90 License
91 =======
92
93 Copyright 2015 Gentoo Foundation, Inc; referenced text
94 belongs to its owner(s).
95
96 The contents of this document are licensed under the
97 Creative Commons - Attribution / Share Alike license.
98
99 http://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
signature.asc application/pgp-signature