Bug 229191 (CVE-2005-4268) - CVE-2005-4268 cpio large filesize buffer overflow
Summary: CVE-2005-4268 cpio large filesize buffer overflow
Alias: CVE-2005-4268
Product: Security Response
Classification: Other
Component: vulnerability   
(Show other bugs)
Version: unspecified
Hardware: x86_64
OS: Linux
Target Milestone: ---
Assignee: Radek Brich
QA Contact: Brock Organ
Whiteboard: impact=low,public=20051107,reported=2...
Keywords: Security
Depends On: 568072
TreeView+ depends on / blocked
Reported: 2007-02-19 13:41 UTC by Mark J. Cox
Modified: 2010-03-16 01:37 UTC (History)
3 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2008-05-26 15:22:13 UTC
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)
patch fixing buffer overflow on 64bit systems for cpio-2.5 (1.15 KB, patch)
2007-02-27 13:42 UTC, Lukas Vrabel
no flags Details | Diff

External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2010:0145 normal SHIPPED_LIVE Moderate: cpio security update 2010-03-16 01:37:21 UTC

Description Mark J. Cox 2007-02-19 13:41:30 UTC
Clone for rhel3/rhel2.1

+++ This bug was initially created as a clone of Bug #172669 +++

From Bugzilla Helper:
User-Agent: Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.7.12) Gecko/20050922
Fedora/1.0.7-1.1.fc4 Firefox/1.0.7

Description of problem:
The latest update to cpio is being killed after a buffer overflow is detected.

Version-Release number of selected component (if applicable):

How reproducible:

Steps to Reproduce:
cpio is given a large hierarchy of files and started using "cpio -o --format=crc"

-- Additional comment from arjanv@redhat.com on 2005-11-10 09:03 EST --
      char ascii_header[112];
      sprintf (ascii_header,
               file_hdr->c_ino, file_hdr->c_mode, file_hdr->c_uid,
               file_hdr->c_gid, file_hdr->c_nlink, file_hdr->c_mtime,
             file_hdr->c_filesize, file_hdr->c_dev_maj, file_hdr->c_dev_min,
           file_hdr->c_rdev_maj, file_hdr->c_rdev_min, file_hdr->c_namesize,


cpio assumes the filesize is at most 8 digits in size... and that's not right.
If it's more, this buffer will indeed overflow....

this probably wants to use asprintf() or so

-- Additional comment from bressers@redhat.com on 2005-11-10 13:07 EST --

Please note that this is only a security issue on 64 bit platforms.

This issue should also affect RHEL2.1 and RHEL3

Comment 1 Lukas Vrabel 2007-02-27 13:42:24 UTC
Created attachment 148861 [details]
patch fixing buffer overflow on 64bit systems for cpio-2.5

Comment 10 errata-xmlrpc 2010-03-16 01:37:32 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 3

Via RHSA-2010:0145 https://rhn.redhat.com/errata/RHSA-2010-0145.html

Note You need to log in before you can comment on or make changes to this bug.