You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa cpio

Sigurnosni nedostaci programskog paketa cpio

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-2906-1
February 22, 2016

cpio vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 15.10
– Ubuntu 14.04 LTS
– Ubuntu 12.04 LTS

Summary:

Several security issues were fixed in GNU cpio.

Software Description:
– cpio: a tool to manage archives of files

Details:

Alexander Cherepanov discovered that GNU cpio incorrectly handled symbolic
links when used with the –no-absolute-filenames option. If a user or
automated system were tricked into extracting a specially-crafted cpio
archive, a remote attacker could possibly use this issue to write arbitrary
files. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS.
(CVE-2015-1197)

Gustavo Grieco discovered that GNU cpio incorrectly handled memory when
extracting archive files. If a user or automated system were tricked into
extracting a specially-crafted cpio archive, a remote attacker could use
this issue to cause GNU cpio to crash, resulting in a denial of service, or
possibly execute arbitrary code. (CVE-2016-2037)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 15.10:
cpio 2.11+dfsg-4.1ubuntu1.1

Ubuntu 14.04 LTS:
cpio 2.11+dfsg-1ubuntu1.2

Ubuntu 12.04 LTS:
cpio 2.11-7ubuntu3.2

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2906-1
CVE-2015-1197, CVE-2016-2037

Package Information:
https://launchpad.net/ubuntu/+source/cpio/2.11+dfsg-4.1ubuntu1.1
https://launchpad.net/ubuntu/+source/cpio/2.11+dfsg-1ubuntu1.2
https://launchpad.net/ubuntu/+source/cpio/2.11-7ubuntu3.2

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2
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=t2hp
—–END PGP SIGNATURE—–

AutorMarijo Plepelic
Cert idNCERT-REF-2016-02-0007-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa postgresql

Otkriveni su sigurnosni nedostaci u programskom paketu postgresql za operativni sustav Fedora. Otkriveni nedostaci potencijalnim napadačima omogućuju izvršavanje napada uskraćivanjem...

Close