Search CVE reports
1 – 10 of 13 results
CVE-2023-7207
Medium prioritySome fixes available 3 of 4
Debian's cpio contains a path traversal vulnerability. This issue was introduced by reverting CVE-2015-1197 patches which had caused a regression in --no-absolute-filenames. Upstream has since provided a proper fix...
1 affected packages
cpio
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
cpio | Not affected | Fixed | Fixed | Not affected | Not affected |
CVE-2023-7216
Medium priorityA path traversal vulnerability was found in the CPIO utility. This issue could allow a remote unauthenticated attacker to trick a user into opening a specially crafted archive. During the extraction process, the archiver could...
1 affected packages
cpio
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
cpio | Vulnerable | Vulnerable | Vulnerable | Vulnerable | Vulnerable |
CVE-2021-38185
Medium priorityGNU cpio through 2.13 allows attackers to execute arbitrary code via a crafted pattern file, because of a dstring.c ds_fgetstr integer overflow that triggers an out-of-bounds heap write. NOTE: it is unclear whether there are...
1 affected packages
cpio
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
cpio | — | Fixed | Fixed | Fixed | Fixed |
CVE-2019-14866
Medium priorityIn all versions of cpio before 2.13 does not properly validate input files when generating TAR archives. When cpio is used to create TAR archives from paths an attacker can write to, the resulting archive may contain files with...
1 affected packages
cpio
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
cpio | — | — | — | Fixed | Fixed |
CVE-2016-2037
Medium prioritySome fixes available 6 of 7
The cpio_safer_name_suffix function in util.c in cpio 2.11 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted cpio file.
1 affected packages
cpio
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
cpio | — | — | — | — | Fixed |
CVE-2015-1197
Low prioritySome fixes available 2 of 5
cpio 2.11, when using the --no-absolute-filenames option, allows local users to write to arbitrary files via a symlink attack on a file in an archive.
1 affected packages
cpio
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
cpio | — | — | — | — | Not affected |
CVE-2014-9112
Medium priorityHeap-based buffer overflow in the process_copy_in function in GNU Cpio 2.11 allows remote attackers to cause a denial of service via a large block value in a cpio archive.
1 affected packages
cpio
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
cpio | — | — | — | — | — |
CVE-2010-0624
Low prioritySome fixes available 1 of 13
Heap-based buffer overflow in the rmt_read__ function in lib/rtapelib.c in the rmt client functionality in GNU tar before 1.23 and GNU cpio before 2.11 allows remote rmt servers to cause a denial of service (memory corruption) or...
2 affected packages
cpio, tar
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
cpio | — | — | — | — | — |
tar | — | — | — | — | — |
CVE-2007-4476
Low prioritySome fixes available 5 of 8
Buffer overflow in the safer_name_suffix function in GNU tar has unspecified attack vectors and impact, resulting in a "crashing stack."
2 affected packages
cpio, tar
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
cpio | — | — | — | — | — |
tar | — | — | — | — | — |
CVE-2005-4268
Unknown priorityBuffer overflow in cpio 2.6-8.FC4 on 64-bit platforms, when creating a cpio archive, allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a file whose size is represented by more than 8 digits.
1 affected packages
cpio
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
cpio | — | — | — | — | — |