Bug 37294

Summary: cpio: Buffer overflow (3.2)
Product: UCS Reporter: Moritz Muehlenhoff <jmm>
Component: Security updatesAssignee: Arvid Requate <requate>
Status: CLOSED FIXED QA Contact: Janek Walkenhorst <walkenhorst>
Severity: normal    
Priority: P3 CC: gohmann, requate
Version: UCS 3.2Flags: requate: Patch_Available+
Target Milestone: UCS 3.2-8-errata   
Hardware: Other   
OS: Linux   
What kind of report is it?: --- What type of bug is this?: ---
Who will be affected by this bug?: --- How will those affected feel about the bug?: ---
User Pain: Enterprise Customer affected?:
School Customer affected?: ISV affected?:
Waiting Support: Flags outvoted (downgraded) after PO Review:
Ticket number: Bug group (optional):
Max CVSS v3 score:

Description Moritz Muehlenhoff univentionstaff 2014-12-11 07:30:57 CET
A buffer overflow in cpio allows the execution of arbitrary code or denial of service if a malformed CPIO archive is opened (CVE-2014-9112)
Comment 1 Moritz Muehlenhoff univentionstaff 2015-01-19 07:48:02 CET
Directory traversal in cpio (CVE-2015-1197)
Comment 2 Arvid Requate univentionstaff 2015-05-06 18:09:28 CEST
CVE-2014-9112 has been fixed in upstream Debian package version 2.11-4+deb6u1

CVE-2015-1197 has bee classified as "Minor issue" in Debian
Comment 3 Arvid Requate univentionstaff 2016-02-17 16:16:44 CET
Upstream Debian package version 2.11-4+deb6u2 fixes this additional issue:

* out-of-bounds write with cpio 2.11 (CVE-2016-2037)
Comment 4 Arvid Requate univentionstaff 2016-06-13 13:12:22 CEST
Upstream version 2.11-4+deb6u2 imported and built.
Advisory: cpio.yaml
Comment 5 Janek Walkenhorst univentionstaff 2016-06-24 17:46:39 CEST
Tests (i386): OK
Advisory: OK
Comment 6 Janek Walkenhorst univentionstaff 2016-06-29 12:38:49 CEST
<http://errata.software-univention.de/ucs/3.2/439.html>