Linux Compatible
  • News
    • Channels
    • Archive
    • Search
    • Submit
  • Articles
    • Categories
  • Knowledgebase
  • Compatibility
    • Search
  • Links
  • Forums
  • Twitter
Advertisement

Latest News
[ Windows | Linux | Apple ]

· Linux-tools Update for Debian 8
· More Linux Kernel Updates for Ubuntu
· Xiaomi Mi Mix 2s Hands-on Review and more
· Chromium, Google Chrome Security Updates for Gentoo Linux
· Initscripts and Patch Updates for Oracle Linux
· ZSH, Roundcube, and xfig Updates for Arch Linux
· PackageKit, hdf5, and VirtualBox Updates for openSUSE
· MySQL and Linux Kernel Updates for Ubuntu Linux
· Ruby Updates for Debian 7 LTS
· ASUS ROG Strix Scar Edition Laptop Review and more

Upcoming News
· Samsung 860 Pro SSD Review @ Vortez
· Raijintek Orcus 240 @ TechPowerUp
· Team Group Cardea Zero 240 GB @ TechPowerUp
· Guru3D Rig of the Month - January 2018
· Cooler Master MK750 Review @ Vortez
· Seagate Skyhawk 10TB SATA III HDD Review
· Vulkan Continues To Show Its Gaming Strength On Low-End Hardware
· Seagate IronWolf ST12000VN0007 12TB Hard Drive Review @ APH Networks
· Sennheiser Game One @ TechPowerUp
· be quiet! Straight Power 11 1000W Power Supply Review

Linux Compatibility
· Brother DCP-L2540DN
· Sound Blaster E5
· WD Elements 500GB external hard drive
· Canon D660U Flatbad scanner
· Umax Astra 4500 USB Scanner
· Logitech QuickCam Pro 4000
· Dell Latitude E6420
· Creative Sound Blaster Z
· Photosmart 5520
· TB-5300 Slimline Design Tablet

New Forum Topics
· Dale
by: Dale Blinco
on: 2018-02-05 00:26
1 replies, 1217 views

· modem driver needed
by: jongiffen777
on: 2017-12-13 11:11
1 replies, 2399 views

· Need a decent browser for XP Pro!
by: percy
on: 2017-12-05 11:02
2 replies, 4282 views

· Comodo Time Machine + Faronics Deep Freeze
by: Jabberwocky
on: 2017-11-15 23:17
1 replies, 2887 views

· Linux compatablity
by: ibme
on: 2017-10-04 18:05
1 replies, 4800 views

News Channels
· Drivers
· Guides
· Reviews
· Security
· Software
· Press Release
· Updates
· Interviews
· Linux
· General
· Debian
· Red Hat
· Slackware
· Gentoo
· Mandriva
· White Box
· SUSE
· GNOME
· KDE
· CentOS
· Ubuntu
· MEPIS
· Android
· Oracle Linux
· Arch Linux

What's New
Login to see an overview of all news stories since your last visit.

Welcome to our website

To take full advantage of all features you need to login or register. Registration is completely free and takes only a few seconds.

Linux Compatible » News » June 2005 » GLSA 200506-16: cpio: Directory traversal vulnerability

GLSA 200506-16: cpio: Directory traversal vulnerability

Posted by Philipp Esselbach on: 06/20/2005 04:44 AM [ Print | 0 comment(s) ]

A cpio security update is available for Gentoo Linux

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200506-16
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Severity: Normal
Title: cpio: Directory traversal vulnerability
Date: June 20, 2005
Bugs: #90619
ID: 200506-16

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
=======

cpio contains a flaw which may allow a specially crafted cpio archive to extract files to an arbitrary directory.




Background
=========

cpio is a file archival tool which can also read and write tar files.

Affected packages
================

-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 app-arch/cpio lt; 2.6-r3 gt;= 2.6-r3

Description
==========

A vulnerability has been found in cpio that can potentially allow a cpio archive to extract its files to an arbitrary directory of the creator's choice.

Impact
=====

An attacker could create a malicious cpio archive which would create files in arbitrary locations on the victim's system. This issue could also be used in conjunction with a previous race condition vulnerability (CAN-2005-1111) to change permissions on files owned by the victim.

Workaround
=========

There is no known workaround at this time.

Resolution
=========

All cpio users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose "gt;=app-arch/cpio-2.6-r3"

References
=========

[ 1 ] Original Advisory
http://www.securityfocus.com/archive/1/396429
[ 2 ] CAN-2005-1111
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1111

Availability
===========

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

http://security.gentoo.org/glsa/glsa-200506-16.xml

Concerns?
========

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org.

License
======

Copyright 2005 Gentoo Foundation, Inc; referenced text belongs to its owner(s).

The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.0


Bookmark and Share

« Actiontec Wireless G Ethernet Adapter @ TheTechLounge · Industry Update From Corsair Memory - TCCD Supply Demystified »

Linux Compatible » News » June 2005 » GLSA 200506-16: cpio: Directory traversal vulnerability
All products mentioned are registered trademarks or trademarks of their respective owners.
© 2002-2018 Esselbach Internet Solutions - All Rights Reserved. Terms and privacy policy
Powered by Contentteller® Business Edition