An update for cpio is now available for openEuler-20.03-LTS-SP3 Security Advisory openeuler-security@openeuler.org openEuler security committee openEuler-SA-2023-1336 Final 1.0 1.0 2023-06-10 Initial 2023-06-10 2023-06-10 openEuler SA Tool V1.0 2023-06-10 cpio security update An update for cpio is now available for openEuler-20.03-LTS-SP3. GNU cpio copies files into or out of a cpio or tar archive.The archive can be another file on the disk, a magnetic tape, or a pipe. Security Fix(es): cpio 2.11, when using the --no-absolute-filenames option, allows local users to write to arbitrary files via a symlink attack on a file in an archive.(CVE-2015-1197) An update for cpio is now available for openEuler-20.03-LTS-SP3. openEuler Security has rated this update as having a security impact of low. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. Low cpio https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1336 https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2015-1197 https://nvd.nist.gov/vuln/detail/CVE-2015-1197 openEuler-20.03-LTS-SP3 cpio-debuginfo-2.13-5.oe1.aarch64.rpm cpio-2.13-5.oe1.aarch64.rpm cpio-debugsource-2.13-5.oe1.aarch64.rpm cpio-help-2.13-5.oe1.noarch.rpm cpio-2.13-5.oe1.src.rpm cpio-debuginfo-2.13-5.oe1.x86_64.rpm cpio-debugsource-2.13-5.oe1.x86_64.rpm cpio-2.13-5.oe1.x86_64.rpm cpio 2.11, when using the --no-absolute-filenames option, allows local users to write to arbitrary files via a symlink attack on a file in an archive. 2023-06-10 CVE-2015-1197 openEuler-20.03-LTS-SP3 Low 1.9 AV:L/AC:M/Au:N/C:N/I:P/A:N cpio security update 2023-06-10 https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1336