Login
Newsletter
Werbung

Sicherheit: Zwei Probleme in GNU cpio
Aktuelle Meldungen Distributionen
Name: Zwei Probleme in GNU cpio
ID: USN-2906-1
Distribution: Ubuntu
Plattformen: Ubuntu 12.04 LTS, Ubuntu 14.04 LTS, Ubuntu 15.10
Datum: Di, 23. Februar 2016, 08:48
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2037
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1197
Applikationen: GNU cpio

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============4765846985695250503==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="O3mk3Ac52SQXpQpIrxj445aixTqEvxruk"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--O3mk3Ac52SQXpQpIrxj445aixTqEvxruk
Content-Type: text/plain; charset=utf-
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-2906-1
February 22, 2016

cpio vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 15.10
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS

Summary:

Several security issues were fixed in GNU cpio.

Software Description:
- cpio: a tool to manage archives of files

Details:

Alexander Cherepanov discovered that GNU cpio incorrectly handled symbolic
links when used with the --no-absolute-filenames option. If a user or
automated system were tricked into extracting a specially-crafted cpio
archive, a remote attacker could possibly use this issue to write arbitrary
files. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS.
(CVE-2015-1197)

Gustavo Grieco discovered that GNU cpio incorrectly handled memory when
extracting archive files. If a user or automated system were tricked into
extracting a specially-crafted cpio archive, a remote attacker could use
this issue to cause GNU cpio to crash, resulting in a denial of service, or
possibly execute arbitrary code. (CVE-2016-2037)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 15.10:
cpio 2.11+dfsg-4.1ubuntu1.1

Ubuntu 14.04 LTS:
cpio 2.11+dfsg-1ubuntu1.2

Ubuntu 12.04 LTS:
cpio 2.11-7ubuntu3.2

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2906-1
CVE-2015-1197, CVE-2016-2037

Package Information:
https://launchpad.net/ubuntu/+source/cpio/2.11+dfsg-4.1ubuntu1.1
https://launchpad.net/ubuntu/+source/cpio/2.11+dfsg-1ubuntu1.2
https://launchpad.net/ubuntu/+source/cpio/2.11-7ubuntu3.2



--O3mk3Ac52SQXpQpIrxj445aixTqEvxruk
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=t2hp
-----END PGP SIGNATURE-----

--O3mk3Ac52SQXpQpIrxj445aixTqEvxruk--


--===============4765846985695250503==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============4765846985695250503==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung