RedHat: Low: cpio security update

    Date18 Feb 2005
    CategoryRed Hat
    5715
    Posted ByJoe Shakespeare
    An updated cpio package that fixes a umask bug and supports large files (>2GB) is now available. This update has been rated as having low security impact by the Red Hat Security Response Team
    - ---------------------------------------------------------------------
                       Red Hat Security Advisory
    
    Synopsis:          Low: cpio security update
    Advisory ID:       RHSA-2005:080-01
    Advisory URL:      https://rhn.redhat.com/errata/RHSA-2005-080.html
    Issue date:        2005-02-18
    Updated on:        2005-02-18
    Product:           Red Hat Enterprise Linux
    Keywords:          cpio umask
    CVE Names:         CAN-1999-1572
    - ---------------------------------------------------------------------
    
    1. Summary:
    
    An updated cpio package that fixes a umask bug and supports large files
    (>2GB) is now available.
    
    This update has been rated as having low security impact by the Red Hat
    Security Response Team
    
    2. Relevant releases/architectures:
    
    Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
    Red Hat Desktop version 3 - i386, x86_64
    Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
    Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64
    
    3. Problem description:
    
    GNU cpio copies files into or out of a cpio or tar archive. 
    
    It was discovered that cpio uses a 0 umask when creating files using the -O
    (archive) option. This creates output files with mode 0666 (all can read
    and write) regardless of the user's umask setting. The Common
    Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
    CAN-1999-1572 to this issue.
    
    All users of cpio should upgrade to this updated package, which resolves
    this issue, and adds support for large files (> 2GB).
    
    4. Solution:
    
    Before applying this update, make sure that all previously-released
    errata relevant to your system have been applied.  Use Red Hat
    Network to download and update your packages.  To launch the Red Hat
    Update Agent, use the following command:
    
        up2date
    
    For information on how to install packages manually, refer to the
    following Web page for the System Administration or Customization
    guide specific to your system:
    
        http://www.redhat.com/docs/manuals/enterprise/
    
    5. Bug IDs fixed (http://bugzilla.redhat.com/):
    
    145720 - CAN-1999-1572 cpio insecure file creation
    105617 - cpio does not support large files > 2GB
    144688 - cpio fails to unpack initrd on ppc
    
    6. RPMs required:
    
    Red Hat Enterprise Linux AS version 3:
    
    SRPMS:
    ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/cpio-2.5-3e.3.src.rpm
    53c26afeb29e541f23e3bf74049632e0  cpio-2.5-3e.3.src.rpm
    
    i386:
    2f7640bac79d70881542b4ea2f27b9a9  cpio-2.5-3e.3.i386.rpm
    
    ia64:
    af616c0444113d8056fc9b462da9ea1e  cpio-2.5-3e.3.ia64.rpm
    
    ppc:
    b7af34936d1cf57f43ae4f47cdb4a320  cpio-2.5-3e.3.ppc.rpm
    
    s390:
    6a3deef23563bffca6a8b50cc153408a  cpio-2.5-3e.3.s390.rpm
    
    s390x:
    67ea8870629f5355f5935699c19e95a9  cpio-2.5-3e.3.s390x.rpm
    
    x86_64:
    64839becc965195850d50c074c375a68  cpio-2.5-3e.3.x86_64.rpm
    
    Red Hat Desktop version 3:
    
    SRPMS:
    ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/cpio-2.5-3e.3.src.rpm
    53c26afeb29e541f23e3bf74049632e0  cpio-2.5-3e.3.src.rpm
    
    i386:
    2f7640bac79d70881542b4ea2f27b9a9  cpio-2.5-3e.3.i386.rpm
    
    x86_64:
    64839becc965195850d50c074c375a68  cpio-2.5-3e.3.x86_64.rpm
    
    Red Hat Enterprise Linux ES version 3:
    
    SRPMS:
    ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/cpio-2.5-3e.3.src.rpm
    53c26afeb29e541f23e3bf74049632e0  cpio-2.5-3e.3.src.rpm
    
    i386:
    2f7640bac79d70881542b4ea2f27b9a9  cpio-2.5-3e.3.i386.rpm
    
    ia64:
    af616c0444113d8056fc9b462da9ea1e  cpio-2.5-3e.3.ia64.rpm
    
    x86_64:
    64839becc965195850d50c074c375a68  cpio-2.5-3e.3.x86_64.rpm
    
    Red Hat Enterprise Linux WS version 3:
    
    SRPMS:
    ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/cpio-2.5-3e.3.src.rpm
    53c26afeb29e541f23e3bf74049632e0  cpio-2.5-3e.3.src.rpm
    
    i386:
    2f7640bac79d70881542b4ea2f27b9a9  cpio-2.5-3e.3.i386.rpm
    
    ia64:
    af616c0444113d8056fc9b462da9ea1e  cpio-2.5-3e.3.ia64.rpm
    
    x86_64:
    64839becc965195850d50c074c375a68  cpio-2.5-3e.3.x86_64.rpm
    
    These packages are GPG signed by Red Hat for security.  Our key and 
    details on how to verify the signature are available from
    https://www.redhat.com/security/team/key/#package
    
    7. References:
    
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-1999-1572
    
    8. Contact:
    
    The Red Hat security contact is .  More contact
    details at https://www.redhat.com/security/team/contact/
    
    Copyright 2005 Red Hat, Inc.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"65","type":"x","order":"1","pct":57.52,"resources":[]},{"id":"88","title":"Should be more technical","votes":"15","type":"x","order":"2","pct":13.27,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"33","type":"x","order":"3","pct":29.2,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.