==========================================================================
Ubuntu Security Notice USN-2906-1
February 22, 2016
cpio vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 15.10
– Ubuntu 14.04 LTS
– Ubuntu 12.04 LTS
Summary:
Several security issues were fixed in GNU cpio.
Software Description:
– cpio: a tool to manage archives of files
Details:
Alexander Cherepanov discovered that GNU cpio incorrectly handled symbolic
links when used with the –no-absolute-filenames option. If a user or
automated system were tricked into extracting a specially-crafted cpio
archive, a remote attacker could possibly use this issue to write arbitrary
files. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS.
(CVE-2015-1197)
Gustavo Grieco discovered that GNU cpio incorrectly handled memory when
extracting archive files. If a user or automated system were tricked into
extracting a specially-crafted cpio archive, a remote attacker could use
this issue to cause GNU cpio to crash, resulting in a denial of service, or
possibly execute arbitrary code. (CVE-2016-2037)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 15.10:
cpio 2.11+dfsg-4.1ubuntu1.1
Ubuntu 14.04 LTS:
cpio 2.11+dfsg-1ubuntu1.2
Ubuntu 12.04 LTS:
cpio 2.11-7ubuntu3.2
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2906-1
CVE-2015-1197, CVE-2016-2037
Package Information:
https://launchpad.net/ubuntu/+source/cpio/2.11+dfsg-4.1ubuntu1.1
https://launchpad.net/ubuntu/+source/cpio/2.11+dfsg-1ubuntu1.2
https://launchpad.net/ubuntu/+source/cpio/2.11-7ubuntu3.2
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2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=t2hp
—–END PGP SIGNATURE—–
—