Date: 16 March 2010
References: ESB-2006.0036 ESB-2007.0936 ESB-2007.1053 ESB-2010.0428 ESB-2010.0789.5
Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2010.0248
tar and cpio security updates
16 March 2010
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: tar
cpio
Publisher: Red Hat
Operating System: Red Hat
UNIX variants (UNIX, Linux, OSX)
Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction
Denial of Service -- Remote with User Interaction
Resolution: Patch/Upgrade
CVE Names: CVE-2010-0624 CVE-2007-4476 CVE-2005-4268
Reference: ESB-2007.1053
ESB-2007.0936
ESB-2006.0036
Original Bulletin:
https://rhn.redhat.com/errata/RHSA-2010-0141.html
https://rhn.redhat.com/errata/RHSA-2010-0142.html
https://rhn.redhat.com/errata/RHSA-2010-0143.html
https://rhn.redhat.com/errata/RHSA-2010-0144.html
https://rhn.redhat.com/errata/RHSA-2010-0145.html
Comment: This advisory references vulnerabilities in products which run on
platforms other than Red Hat. It is recommended that administrators
running tar or cpio check for an updated version of the software for
their operating system.
This bulletin contains five (5) Red Hat Security advisories
relating to vulnerabilities affecting tar and cpio.
- --------------------------BEGIN INCLUDED TEXT--------------------
- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Moderate: tar security update
Advisory ID: RHSA-2010:0141-01
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2010-0141.html
Issue date: 2010-03-15
CVE Names: CVE-2007-4476 CVE-2010-0624
=====================================================================
1. Summary:
An updated tar package that fixes two security issues is now available for
Red Hat Enterprise Linux 4 and 5.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
2. Relevant releases/architectures:
Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64
Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64
3. Description:
The GNU tar program saves many files together in one archive and can
restore individual files (or all of the files) from that archive.
A heap-based buffer overflow flaw was found in the way tar expanded archive
files. If a user were tricked into expanding a specially-crafted archive,
it could cause the tar executable to crash or execute arbitrary code with
the privileges of the user running tar. (CVE-2010-0624)
Red Hat would like to thank Jakob Lell for responsibly reporting the
CVE-2010-0624 issue.
A denial of service flaw was found in the way tar expanded archive files.
If a user expanded a specially-crafted archive, it could cause the tar
executable to crash. (CVE-2007-4476)
Users of tar are advised to upgrade to this updated package, which contains
backported patches to correct these issues.
4. Solution:
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
5. Bugs fixed (http://bugzilla.redhat.com/):
280961 - CVE-2007-4476 tar/cpio stack crashing in safer_name_suffix
564368 - CVE-2010-0624 tar, cpio: Heap-based buffer overflow by expanding a specially-crafted archive
6. Package List:
Red Hat Enterprise Linux AS version 4:
Source:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/tar-1.14-13.el4_8.1.src.rpm
i386:
tar-1.14-13.el4_8.1.i386.rpm
tar-debuginfo-1.14-13.el4_8.1.i386.rpm
ia64:
tar-1.14-13.el4_8.1.ia64.rpm
tar-debuginfo-1.14-13.el4_8.1.ia64.rpm
ppc:
tar-1.14-13.el4_8.1.ppc.rpm
tar-debuginfo-1.14-13.el4_8.1.ppc.rpm
s390:
tar-1.14-13.el4_8.1.s390.rpm
tar-debuginfo-1.14-13.el4_8.1.s390.rpm
s390x:
tar-1.14-13.el4_8.1.s390x.rpm
tar-debuginfo-1.14-13.el4_8.1.s390x.rpm
x86_64:
tar-1.14-13.el4_8.1.x86_64.rpm
tar-debuginfo-1.14-13.el4_8.1.x86_64.rpm
Red Hat Enterprise Linux Desktop version 4:
Source:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/tar-1.14-13.el4_8.1.src.rpm
i386:
tar-1.14-13.el4_8.1.i386.rpm
tar-debuginfo-1.14-13.el4_8.1.i386.rpm
x86_64:
tar-1.14-13.el4_8.1.x86_64.rpm
tar-debuginfo-1.14-13.el4_8.1.x86_64.rpm
Red Hat Enterprise Linux ES version 4:
Source:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/tar-1.14-13.el4_8.1.src.rpm
i386:
tar-1.14-13.el4_8.1.i386.rpm
tar-debuginfo-1.14-13.el4_8.1.i386.rpm
ia64:
tar-1.14-13.el4_8.1.ia64.rpm
tar-debuginfo-1.14-13.el4_8.1.ia64.rpm
x86_64:
tar-1.14-13.el4_8.1.x86_64.rpm
tar-debuginfo-1.14-13.el4_8.1.x86_64.rpm
Red Hat Enterprise Linux WS version 4:
Source:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/tar-1.14-13.el4_8.1.src.rpm
i386:
tar-1.14-13.el4_8.1.i386.rpm
tar-debuginfo-1.14-13.el4_8.1.i386.rpm
ia64:
tar-1.14-13.el4_8.1.ia64.rpm
tar-debuginfo-1.14-13.el4_8.1.ia64.rpm
x86_64:
tar-1.14-13.el4_8.1.x86_64.rpm
tar-debuginfo-1.14-13.el4_8.1.x86_64.rpm
Red Hat Enterprise Linux Desktop (v. 5 client):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/tar-1.15.1-23.0.1.el5_4.2.src.rpm
i386:
tar-1.15.1-23.0.1.el5_4.2.i386.rpm
tar-debuginfo-1.15.1-23.0.1.el5_4.2.i386.rpm
x86_64:
tar-1.15.1-23.0.1.el5_4.2.x86_64.rpm
tar-debuginfo-1.15.1-23.0.1.el5_4.2.x86_64.rpm
Red Hat Enterprise Linux (v. 5 server):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/tar-1.15.1-23.0.1.el5_4.2.src.rpm
i386:
tar-1.15.1-23.0.1.el5_4.2.i386.rpm
tar-debuginfo-1.15.1-23.0.1.el5_4.2.i386.rpm
ia64:
tar-1.15.1-23.0.1.el5_4.2.ia64.rpm
tar-debuginfo-1.15.1-23.0.1.el5_4.2.ia64.rpm
ppc:
tar-1.15.1-23.0.1.el5_4.2.ppc.rpm
tar-debuginfo-1.15.1-23.0.1.el5_4.2.ppc.rpm
s390x:
tar-1.15.1-23.0.1.el5_4.2.s390x.rpm
tar-debuginfo-1.15.1-23.0.1.el5_4.2.s390x.rpm
x86_64:
tar-1.15.1-23.0.1.el5_4.2.x86_64.rpm
tar-debuginfo-1.15.1-23.0.1.el5_4.2.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package
7. References:
https://www.redhat.com/security/data/cve/CVE-2007-4476.html
https://www.redhat.com/security/data/cve/CVE-2010-0624.html
http://www.redhat.com/security/updates/classification/#moderate
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://www.redhat.com/security/team/contact/
Copyright 2010 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFLnuFEXlSAg2UNWIIRAnxjAJ9GgFlPQZj/8ynlgZO0dYy1b/WauACePzmm
X0wj7lN6d/rnLQwU/qjtYnc=
=3Tmy
- -----END PGP SIGNATURE-----
- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Moderate: tar security update
Advisory ID: RHSA-2010:0142-01
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2010-0142.html
Issue date: 2010-03-15
CVE Names: CVE-2010-0624
=====================================================================
1. Summary:
An updated tar package that fixes one security issue is now available for
Red Hat Enterprise Linux 3.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
2. Relevant releases/architectures:
Red Hat Desktop version 3 - i386, x86_64
Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64
3. Description:
The GNU tar program saves many files together in one archive and can
restore individual files (or all of the files) from that archive.
A heap-based buffer overflow flaw was found in the way tar expanded archive
files. If a user were tricked into expanding a specially-crafted archive,
it could cause the tar executable to crash or execute arbitrary code with
the privileges of the user running tar. (CVE-2010-0624)
Red Hat would like to thank Jakob Lell for responsibly reporting this
issue.
Users of tar are advised to upgrade to this updated package, which contains
a backported patch to correct this issue.
4. Solution:
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
5. Bugs fixed (http://bugzilla.redhat.com/):
564368 - CVE-2010-0624 tar, cpio: Heap-based buffer overflow by expanding a specially-crafted archive
6. Package List:
Red Hat Enterprise Linux AS version 3:
Source:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/tar-1.13.25-16.RHEL3.src.rpm
i386:
tar-1.13.25-16.RHEL3.i386.rpm
tar-debuginfo-1.13.25-16.RHEL3.i386.rpm
ia64:
tar-1.13.25-16.RHEL3.ia64.rpm
tar-debuginfo-1.13.25-16.RHEL3.ia64.rpm
ppc:
tar-1.13.25-16.RHEL3.ppc.rpm
tar-debuginfo-1.13.25-16.RHEL3.ppc.rpm
s390:
tar-1.13.25-16.RHEL3.s390.rpm
tar-debuginfo-1.13.25-16.RHEL3.s390.rpm
s390x:
tar-1.13.25-16.RHEL3.s390x.rpm
tar-debuginfo-1.13.25-16.RHEL3.s390x.rpm
x86_64:
tar-1.13.25-16.RHEL3.x86_64.rpm
tar-debuginfo-1.13.25-16.RHEL3.x86_64.rpm
Red Hat Desktop version 3:
Source:
ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/tar-1.13.25-16.RHEL3.src.rpm
i386:
tar-1.13.25-16.RHEL3.i386.rpm
tar-debuginfo-1.13.25-16.RHEL3.i386.rpm
x86_64:
tar-1.13.25-16.RHEL3.x86_64.rpm
tar-debuginfo-1.13.25-16.RHEL3.x86_64.rpm
Red Hat Enterprise Linux ES version 3:
Source:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/tar-1.13.25-16.RHEL3.src.rpm
i386:
tar-1.13.25-16.RHEL3.i386.rpm
tar-debuginfo-1.13.25-16.RHEL3.i386.rpm
ia64:
tar-1.13.25-16.RHEL3.ia64.rpm
tar-debuginfo-1.13.25-16.RHEL3.ia64.rpm
x86_64:
tar-1.13.25-16.RHEL3.x86_64.rpm
tar-debuginfo-1.13.25-16.RHEL3.x86_64.rpm
Red Hat Enterprise Linux WS version 3:
Source:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/tar-1.13.25-16.RHEL3.src.rpm
i386:
tar-1.13.25-16.RHEL3.i386.rpm
tar-debuginfo-1.13.25-16.RHEL3.i386.rpm
ia64:
tar-1.13.25-16.RHEL3.ia64.rpm
tar-debuginfo-1.13.25-16.RHEL3.ia64.rpm
x86_64:
tar-1.13.25-16.RHEL3.x86_64.rpm
tar-debuginfo-1.13.25-16.RHEL3.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package
7. References:
https://www.redhat.com/security/data/cve/CVE-2010-0624.html
http://www.redhat.com/security/updates/classification/#moderate
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://www.redhat.com/security/team/contact/
Copyright 2010 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFLnuFQXlSAg2UNWIIRAgbvAJ98oRGGhjJh/xXVedtAB3+weX4I2wCfahVI
cN37+S0WW2sl8HkUhJAFG+A=
=mXrH
- -----END PGP SIGNATURE-----
- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Moderate: cpio security update
Advisory ID: RHSA-2010:0143-01
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2010-0143.html
Issue date: 2010-03-15
CVE Names: CVE-2010-0624
=====================================================================
1. Summary:
An updated cpio package that fixes one security issue is now available for
Red Hat Enterprise Linux 4.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
2. Relevant releases/architectures:
Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64
3. Description:
GNU cpio copies files into or out of a cpio or tar archive.
A heap-based buffer overflow flaw was found in the way cpio expanded
archive files. If a user were tricked into expanding a specially-crafted
archive, it could cause the cpio executable to crash or execute arbitrary
code with the privileges of the user running cpio. (CVE-2010-0624)
Red Hat would like to thank Jakob Lell for responsibly reporting this
issue.
Users of cpio are advised to upgrade to this updated package, which
contains a backported patch to correct this issue.
4. Solution:
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
5. Bugs fixed (http://bugzilla.redhat.com/):
564368 - CVE-2010-0624 tar, cpio: Heap-based buffer overflow by expanding a specially-crafted archive
6. Package List:
Red Hat Enterprise Linux AS version 4:
Source:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/cpio-2.5-16.el4_8.1.src.rpm
i386:
cpio-2.5-16.el4_8.1.i386.rpm
cpio-debuginfo-2.5-16.el4_8.1.i386.rpm
ia64:
cpio-2.5-16.el4_8.1.ia64.rpm
cpio-debuginfo-2.5-16.el4_8.1.ia64.rpm
ppc:
cpio-2.5-16.el4_8.1.ppc.rpm
cpio-debuginfo-2.5-16.el4_8.1.ppc.rpm
s390:
cpio-2.5-16.el4_8.1.s390.rpm
cpio-debuginfo-2.5-16.el4_8.1.s390.rpm
s390x:
cpio-2.5-16.el4_8.1.s390x.rpm
cpio-debuginfo-2.5-16.el4_8.1.s390x.rpm
x86_64:
cpio-2.5-16.el4_8.1.x86_64.rpm
cpio-debuginfo-2.5-16.el4_8.1.x86_64.rpm
Red Hat Enterprise Linux Desktop version 4:
Source:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/cpio-2.5-16.el4_8.1.src.rpm
i386:
cpio-2.5-16.el4_8.1.i386.rpm
cpio-debuginfo-2.5-16.el4_8.1.i386.rpm
x86_64:
cpio-2.5-16.el4_8.1.x86_64.rpm
cpio-debuginfo-2.5-16.el4_8.1.x86_64.rpm
Red Hat Enterprise Linux ES version 4:
Source:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/cpio-2.5-16.el4_8.1.src.rpm
i386:
cpio-2.5-16.el4_8.1.i386.rpm
cpio-debuginfo-2.5-16.el4_8.1.i386.rpm
ia64:
cpio-2.5-16.el4_8.1.ia64.rpm
cpio-debuginfo-2.5-16.el4_8.1.ia64.rpm
x86_64:
cpio-2.5-16.el4_8.1.x86_64.rpm
cpio-debuginfo-2.5-16.el4_8.1.x86_64.rpm
Red Hat Enterprise Linux WS version 4:
Source:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/cpio-2.5-16.el4_8.1.src.rpm
i386:
cpio-2.5-16.el4_8.1.i386.rpm
cpio-debuginfo-2.5-16.el4_8.1.i386.rpm
ia64:
cpio-2.5-16.el4_8.1.ia64.rpm
cpio-debuginfo-2.5-16.el4_8.1.ia64.rpm
x86_64:
cpio-2.5-16.el4_8.1.x86_64.rpm
cpio-debuginfo-2.5-16.el4_8.1.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package
7. References:
https://www.redhat.com/security/data/cve/CVE-2010-0624.html
http://www.redhat.com/security/updates/classification/#moderate
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://www.redhat.com/security/team/contact/
Copyright 2010 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFLnuFdXlSAg2UNWIIRAk/DAJ9grvxhxaqa4rxunM+aTYXmJg3bZACgtUbE
hu4UKT3csRygrMNkpljjKCY=
=T9ke
- -----END PGP SIGNATURE-----
- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Moderate: cpio security update
Advisory ID: RHSA-2010:0144-01
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2010-0144.html
Issue date: 2010-03-15
CVE Names: CVE-2007-4476 CVE-2010-0624
=====================================================================
1. Summary:
An updated cpio package that fixes two security issues is now available for
Red Hat Enterprise Linux 5.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
2. Relevant releases/architectures:
Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64
Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64
3. Description:
GNU cpio copies files into or out of a cpio or tar archive.
A heap-based buffer overflow flaw was found in the way cpio expanded
archive files. If a user were tricked into expanding a specially-crafted
archive, it could cause the cpio executable to crash or execute arbitrary
code with the privileges of the user running cpio. (CVE-2010-0624)
Red Hat would like to thank Jakob Lell for responsibly reporting the
CVE-2010-0624 issue.
A denial of service flaw was found in the way cpio expanded archive files.
If a user expanded a specially-crafted archive, it could cause the cpio
executable to crash. (CVE-2007-4476)
Users of cpio are advised to upgrade to this updated package, which
contains backported patches to correct these issues.
4. Solution:
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
5. Bugs fixed (http://bugzilla.redhat.com/):
280961 - CVE-2007-4476 tar/cpio stack crashing in safer_name_suffix
564368 - CVE-2010-0624 tar, cpio: Heap-based buffer overflow by expanding a specially-crafted archive
6. Package List:
Red Hat Enterprise Linux Desktop (v. 5 client):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/cpio-2.6-23.el5_4.1.src.rpm
i386:
cpio-2.6-23.el5_4.1.i386.rpm
cpio-debuginfo-2.6-23.el5_4.1.i386.rpm
x86_64:
cpio-2.6-23.el5_4.1.x86_64.rpm
cpio-debuginfo-2.6-23.el5_4.1.x86_64.rpm
Red Hat Enterprise Linux (v. 5 server):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/cpio-2.6-23.el5_4.1.src.rpm
i386:
cpio-2.6-23.el5_4.1.i386.rpm
cpio-debuginfo-2.6-23.el5_4.1.i386.rpm
ia64:
cpio-2.6-23.el5_4.1.ia64.rpm
cpio-debuginfo-2.6-23.el5_4.1.ia64.rpm
ppc:
cpio-2.6-23.el5_4.1.ppc.rpm
cpio-debuginfo-2.6-23.el5_4.1.ppc.rpm
s390x:
cpio-2.6-23.el5_4.1.s390x.rpm
cpio-debuginfo-2.6-23.el5_4.1.s390x.rpm
x86_64:
cpio-2.6-23.el5_4.1.x86_64.rpm
cpio-debuginfo-2.6-23.el5_4.1.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package
7. References:
https://www.redhat.com/security/data/cve/CVE-2007-4476.html
https://www.redhat.com/security/data/cve/CVE-2010-0624.html
http://www.redhat.com/security/updates/classification/#moderate
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://www.redhat.com/security/team/contact/
Copyright 2010 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFLnuFsXlSAg2UNWIIRAgrDAJ9XO9ohIGqyy6Ct4hjrqFNW1RIQDQCbBvOn
AUikWVJik+Io8GPO2uKVocA=
=xqvs
- -----END PGP SIGNATURE-----
- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Moderate: cpio security update
Advisory ID: RHSA-2010:0145-01
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2010-0145.html
Issue date: 2010-03-15
CVE Names: CVE-2005-4268 CVE-2010-0624
=====================================================================
1. Summary:
An updated cpio package that fixes two security issues is now available for
Red Hat Enterprise Linux 3.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
2. Relevant releases/architectures:
Red Hat Desktop version 3 - i386, x86_64
Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64
3. Description:
GNU cpio copies files into or out of a cpio or tar archive.
A heap-based buffer overflow flaw was found in the way cpio expanded
archive files. If a user were tricked into expanding a specially-crafted
archive, it could cause the cpio executable to crash or execute arbitrary
code with the privileges of the user running cpio. (CVE-2010-0624)
Red Hat would like to thank Jakob Lell for responsibly reporting the
CVE-2010-0624 issue.
A stack-based buffer overflow flaw was found in the way cpio expanded large
archive files. If a user expanded a specially-crafted archive, it could
cause the cpio executable to crash. This issue only affected 64-bit
platforms. (CVE-2005-4268)
Users of cpio are advised to upgrade to this updated package, which
contains backported patches to correct these issues.
4. Solution:
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
5. Bugs fixed (http://bugzilla.redhat.com/):
229191 - CVE-2005-4268 cpio large filesize buffer overflow
564368 - CVE-2010-0624 tar, cpio: Heap-based buffer overflow by expanding a specially-crafted archive
6. Package List:
Red Hat Enterprise Linux AS version 3:
Source:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/cpio-2.5-6.RHEL3.src.rpm
i386:
cpio-2.5-6.RHEL3.i386.rpm
cpio-debuginfo-2.5-6.RHEL3.i386.rpm
ia64:
cpio-2.5-6.RHEL3.ia64.rpm
cpio-debuginfo-2.5-6.RHEL3.ia64.rpm
ppc:
cpio-2.5-6.RHEL3.ppc.rpm
cpio-debuginfo-2.5-6.RHEL3.ppc.rpm
s390:
cpio-2.5-6.RHEL3.s390.rpm
cpio-debuginfo-2.5-6.RHEL3.s390.rpm
s390x:
cpio-2.5-6.RHEL3.s390x.rpm
cpio-debuginfo-2.5-6.RHEL3.s390x.rpm
x86_64:
cpio-2.5-6.RHEL3.x86_64.rpm
cpio-debuginfo-2.5-6.RHEL3.x86_64.rpm
Red Hat Desktop version 3:
Source:
ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/cpio-2.5-6.RHEL3.src.rpm
i386:
cpio-2.5-6.RHEL3.i386.rpm
cpio-debuginfo-2.5-6.RHEL3.i386.rpm
x86_64:
cpio-2.5-6.RHEL3.x86_64.rpm
cpio-debuginfo-2.5-6.RHEL3.x86_64.rpm
Red Hat Enterprise Linux ES version 3:
Source:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/cpio-2.5-6.RHEL3.src.rpm
i386:
cpio-2.5-6.RHEL3.i386.rpm
cpio-debuginfo-2.5-6.RHEL3.i386.rpm
ia64:
cpio-2.5-6.RHEL3.ia64.rpm
cpio-debuginfo-2.5-6.RHEL3.ia64.rpm
x86_64:
cpio-2.5-6.RHEL3.x86_64.rpm
cpio-debuginfo-2.5-6.RHEL3.x86_64.rpm
Red Hat Enterprise Linux WS version 3:
Source:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/cpio-2.5-6.RHEL3.src.rpm
i386:
cpio-2.5-6.RHEL3.i386.rpm
cpio-debuginfo-2.5-6.RHEL3.i386.rpm
ia64:
cpio-2.5-6.RHEL3.ia64.rpm
cpio-debuginfo-2.5-6.RHEL3.ia64.rpm
x86_64:
cpio-2.5-6.RHEL3.x86_64.rpm
cpio-debuginfo-2.5-6.RHEL3.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package
7. References:
https://www.redhat.com/security/data/cve/CVE-2005-4268.html
https://www.redhat.com/security/data/cve/CVE-2010-0624.html
http://www.redhat.com/security/updates/classification/#moderate
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://www.redhat.com/security/team/contact/
Copyright 2010 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFLnuF8XlSAg2UNWIIRAlfnAJ98t8FX0EHH4SMLVTiZvvbodQyjoQCZAQ+y
AzwCTY7x+8o3rQjoMSFyqPI=
=9Kon
- -----END PGP SIGNATURE-----
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
http://www.auscert.org.au/render.html?cid=1980
If you believe that your computer system has been compromised or attacked in
any way, we encourage you to let us know by completing the secure National IT
Incident Reporting Form at:
http://www.auscert.org.au/render.html?it=3192
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
iD8DBQFLnwnA/iFOrG6YcBERAvHIAKDSmNR7DyGQTO9qxdaiAz694SJzIgCfcucF
jNLbup090R8rO3CT2mrJjoo=
=lP9M
-----END PGP SIGNATURE-----
|