Bug 229191 - (CVE-2005-4268) CVE-2005-4268 cpio large filesize buffer overflow
CVE-2005-4268 cpio large filesize buffer overflow
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
x86_64 Linux
low Severity low
: ---
: ---
Assigned To: Radek Brich
Brock Organ
: Security
Depends On: 568072
  Show dependency treegraph
Reported: 2007-02-19 08:41 EST by Mark J. Cox (Product Security)
Modified: 2010-03-15 21:37 EDT (History)
3 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2008-05-26 11:22:13 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)
patch fixing buffer overflow on 64bit systems for cpio-2.5 (1.15 KB, patch)
2007-02-27 08:42 EST, Lukas Vrabel
no flags Details | Diff

  None (edit)
Description Mark J. Cox (Product Security) 2007-02-19 08:41:30 EST
Clone for rhel3/rhel2.1

+++ This bug was initially created as a clone of Bug #172669 +++

From Bugzilla Helper:
User-Agent: Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.7.12) Gecko/20050922
Fedora/1.0.7-1.1.fc4 Firefox/1.0.7

Description of problem:
The latest update to cpio is being killed after a buffer overflow is detected.

Version-Release number of selected component (if applicable):

How reproducible:

Steps to Reproduce:
cpio is given a large hierarchy of files and started using "cpio -o --format=crc"

-- Additional comment from arjanv@redhat.com on 2005-11-10 09:03 EST --
      char ascii_header[112];
      sprintf (ascii_header,
               file_hdr->c_ino, file_hdr->c_mode, file_hdr->c_uid,
               file_hdr->c_gid, file_hdr->c_nlink, file_hdr->c_mtime,
             file_hdr->c_filesize, file_hdr->c_dev_maj, file_hdr->c_dev_min,
           file_hdr->c_rdev_maj, file_hdr->c_rdev_min, file_hdr->c_namesize,


cpio assumes the filesize is at most 8 digits in size... and that's not right.
If it's more, this buffer will indeed overflow....

this probably wants to use asprintf() or so

-- Additional comment from bressers@redhat.com on 2005-11-10 13:07 EST --

Please note that this is only a security issue on 64 bit platforms.

This issue should also affect RHEL2.1 and RHEL3
Comment 1 Lukas Vrabel 2007-02-27 08:42:24 EST
Created attachment 148861 [details]
patch fixing buffer overflow on 64bit systems for cpio-2.5
Comment 10 errata-xmlrpc 2010-03-15 21:37:32 EDT
This issue has been addressed in following products:

  Red Hat Enterprise Linux 3

Via RHSA-2010:0145 https://rhn.redhat.com/errata/RHSA-2010-0145.html

Note You need to log in before you can comment on or make changes to this bug.