First published: Tue Jan 07 2020(Updated: )
GNU cpio could allow a local authenticated attacker to gain elevated privileges on the system, caused by the failure to properly validate input files when generating TAR archives. An attacker could exploit this vulnerability to inject any tar content and compromise the system.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
GNU cpio | <2.13 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =8.0 | |
<=10.5 | ||
<=10.6 | ||
<=11.0 | ||
<=11.1 | ||
<=11.2 | ||
<=11.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this security issue is CVE-2019-14866.
The severity of CVE-2019-14866 is high (7.3).
IBM Security Guardium versions up to and including 10.5, 10.6, 11.0, 11.1, 11.2, and 11.3 are affected by this vulnerability. GNU cpio up to version 2.13 and Redhat Enterprise Linux versions 7.0 and 8.0 are also affected.
Exploiting this vulnerability could allow a local authenticated attacker to gain elevated privileges on the system.
To fix this vulnerability, it is recommended to upgrade to a patched version of cpio and apply any available security updates provided by vendors like IBM and Redhat.