Description
Race condition in cpio 2.6 and earlier allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by cpio after the decompression is complete.
Product(s):
- GNU Cpio
- GNU cpio
- GNU cpio 1.0
- GNU cpio 1.1
- GNU cpio 1.2
- GNU cpio 1.3
- GNU cpio 2.4.2
- GNU cpio 2.5.90
- GNU cpio 2.5
- GNU cpio 2.6
- Canonical Ubuntu Linux 4.10
- Canonical Ubuntu Linux 5.04
- Debian Debian Linux 3.0
- Debian Debian Linux 3.1
- Debian Linux 3.1 Alpha Edition
- Debian Linux 3.1 AMD64 Edition
- Debian Linux 3.1 ARM Edition
- Debian Linux 3.1 HPPA Edition
- Debian Linux 3.1 IA-32 Edition
- Debian Linux 3.1 IA-64 Edition
- Debian Linux 3.1 M68K Edition
- Debian Linux 3.1 MIPS Edition
- Debian Linux 3.1 MIPSEL Edition
- Debian Linux 3.1 PPC Edition
- Debian Linux 3.1 S-390 Edition
- Debian Linux 3.1 Sparc Edition
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2005-1111, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2005-1111 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.