Bug 37294 - cpio: Buffer overflow (3.2)
cpio: Buffer overflow (3.2)
Status: CLOSED FIXED
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 3.2
Other Linux
: P3 normal (vote)
: UCS 3.2-8-errata
Assigned To: Arvid Requate
Janek Walkenhorst
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2014-12-11 07:30 CET by Moritz Muehlenhoff
Modified: 2016-06-29 12:38 CEST (History)
2 users (show)

See Also:
What kind of report is it?: ---
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Max CVSS v3 score:
requate: Patch_Available+


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Moritz Muehlenhoff univentionstaff 2014-12-11 07:30:57 CET
A buffer overflow in cpio allows the execution of arbitrary code or denial of service if a malformed CPIO archive is opened (CVE-2014-9112)
Comment 1 Moritz Muehlenhoff univentionstaff 2015-01-19 07:48:02 CET
Directory traversal in cpio (CVE-2015-1197)
Comment 2 Arvid Requate univentionstaff 2015-05-06 18:09:28 CEST
CVE-2014-9112 has been fixed in upstream Debian package version 2.11-4+deb6u1

CVE-2015-1197 has bee classified as "Minor issue" in Debian
Comment 3 Arvid Requate univentionstaff 2016-02-17 16:16:44 CET
Upstream Debian package version 2.11-4+deb6u2 fixes this additional issue:

* out-of-bounds write with cpio 2.11 (CVE-2016-2037)
Comment 4 Arvid Requate univentionstaff 2016-06-13 13:12:22 CEST
Upstream version 2.11-4+deb6u2 imported and built.
Advisory: cpio.yaml
Comment 5 Janek Walkenhorst univentionstaff 2016-06-24 17:46:39 CEST
Tests (i386): OK
Advisory: OK
Comment 6 Janek Walkenhorst univentionstaff 2016-06-29 12:38:49 CEST
<http://errata.software-univention.de/ucs/3.2/439.html>