Scientific Linux Security Update : cpio on SL7.x x86_64

This script is Copyright (C) 2015 Tenable Network Security, Inc.

Synopsis :

The remote Scientific Linux host is missing one or more security

Description :

A heap-based buffer overflow flaw was found in cpio's list_file()
function. An attacker could provide a specially crafted archive that,
when processed by cpio, would crash cpio, or potentially lead to
arbitrary code execution. (CVE-2014-9112)

This update fixes the following bugs :

- Previously, during archive creation, cpio internals did
not detect a read() system call failure. Based on the
premise that the call succeeded, cpio terminated
unexpectedly with a segmentation fault without
processing further files. The underlying source code has
been patched, and an archive is now created

- Previously, running the cpio command without parameters
on Scientific Linux 7 with Russian as the default
language resulted in an error message that was not
accurate in Russian due to an error in spelling. This
has been corrected and the Russian error message is
spelled correctly.

See also :

Solution :

Update the affected cpio and / or cpio-debuginfo packages.

Risk factor :

Medium / CVSS Base Score : 5.0

Family: Scientific Linux Local Security Checks

Nessus Plugin ID: 87552 ()

Bugtraq ID:

CVE ID: CVE-2014-9112

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now