CVE-2014-9112

NameCVE-2014-9112
DescriptionHeap-based buffer overflow in the process_copy_in function in GNU Cpio 2.11 allows remote attackers to cause a denial of service via a large block value in a cpio archive.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-111-1, DSA-3111-1
NVD severitymedium
Debian Bugs772793

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
cpio (PTS)jessie2.11+dfsg-4.1+deb8u1fixed
jessie (security)2.11+dfsg-4.1+deb8u2fixed
stretch2.11+dfsg-6fixed
bullseye, sid, buster2.12+dfsg-9fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
cpiosource(unstable)2.11+dfsg-4772793
cpiosourcesqueeze2.11-4+deb6u1DLA-111-1
cpiosourcewheezy2.11+dfsg-0.1+deb7u1DSA-3111-1

Notes

http://lcamtuf.coredump.cx/afl/vulns/lesspipe-cpio-bad-write.cpio
https://savannah.gnu.org/bugs/?43709
http://git.savannah.gnu.org/cgit/cpio.git/commit/?id=746f3ff6 (fix buffer overflow)
http://git.savannah.gnu.org/cgit/cpio.git/commit/?id=54d1c42a (fix range checking of length of link name)
http://git.savannah.gnu.org/cgit/cpio.git/commit/?id=58df4f1b (fixup of former commit)
http://git.savannah.gnu.org/cgit/cpio.git/commit/?id=fd262d11 (fix null deref)
http://git.savannah.gnu.org/cgit/cpio.git/commit/?id=f6a8a2cb (fix test suite in former commit)

Search for package or bug name: Reporting problems