An update for cpio is now available for openEuler-20.03-LTS-SP1
Security Advisory
openeuler-security@openeuler.org
openEuler security committee
openEuler-SA-2023-1300
Final
1.0
1.0
2023-06-03
Initial
2023-06-03
2023-06-03
openEuler SA Tool V1.0
2023-06-03
cpio security update
An update for cpio is now available for openEuler-20.03-LTS-SP1.
Security Fix(es):
cpio 2.11, when using the --no-absolute-filenames option, allows local users to write to arbitrary files via a symlink attack on a file in an archive.(CVE-2015-1197)
An update for cpio is now available for openEuler-20.03-LTS-SP1.
openEuler Security has rated this update as having a security impact of low. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
Low
cpio
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1300
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2015-1197
https://nvd.nist.gov/vuln/detail/CVE-2015-1197
openEuler-20.03-LTS-SP1
cpio-debugsource-2.13-5.oe1.aarch64.rpm
cpio-2.13-5.oe1.aarch64.rpm
cpio-debuginfo-2.13-5.oe1.aarch64.rpm
cpio-help-2.13-5.oe1.noarch.rpm
cpio-2.13-5.oe1.src.rpm
cpio-debugsource-2.13-5.oe1.x86_64.rpm
cpio-debuginfo-2.13-5.oe1.x86_64.rpm
cpio-2.13-5.oe1.x86_64.rpm
cpio 2.11, when using the --no-absolute-filenames option, allows local users to write to arbitrary files via a symlink attack on a file in an archive.
2023-06-03
CVE-2015-1197
openEuler-20.03-LTS-SP1
Low
1.9
AV:L/AC:M/Au:N/C:N/I:P/A:N
cpio security update
2023-06-03
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1300