Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2021:1582

Опубликовано: 18 мая 2021
Источник: rocky
Оценка: Moderate

Описание

Moderate: cpio security update

The cpio packages provide the GNU cpio utility for creating and extracting archives, or copying files from one place to another.

Security Fix(es):

  • cpio: improper input validation when writing tar header fields leads to unexpected tar generation (CVE-2019-14866)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
cpiox86_6410.el8cpio-2.12-10.el8.x86_64.rpm
cpiox86_6410.el8cpio-2.12-10.el8.x86_64.rpm

Показывать по

Связанные CVE

Связанные уязвимости

CVSS3: 7.3
ubuntu
почти 6 лет назад

In all versions of cpio before 2.13 does not properly validate input files when generating TAR archives. When cpio is used to create TAR archives from paths an attacker can write to, the resulting archive may contain files with permissions the attacker did not have or in paths he did not have access to. Extracting those archives from a high-privilege user without carefully reviewing them may lead to the compromise of the system.

CVSS3: 6.7
redhat
больше 6 лет назад

In all versions of cpio before 2.13 does not properly validate input files when generating TAR archives. When cpio is used to create TAR archives from paths an attacker can write to, the resulting archive may contain files with permissions the attacker did not have or in paths he did not have access to. Extracting those archives from a high-privilege user without carefully reviewing them may lead to the compromise of the system.

CVSS3: 7.3
nvd
почти 6 лет назад

In all versions of cpio before 2.13 does not properly validate input files when generating TAR archives. When cpio is used to create TAR archives from paths an attacker can write to, the resulting archive may contain files with permissions the attacker did not have or in paths he did not have access to. Extracting those archives from a high-privilege user without carefully reviewing them may lead to the compromise of the system.

CVSS3: 7.3
debian
почти 6 лет назад

In all versions of cpio before 2.13 does not properly validate input f ...

suse-cvrf
около 6 лет назад

Security update for cpio