CVE-2014-9112

NameCVE-2014-9112
DescriptionHeap-based buffer overflow in the process_copy_in function in GNU Cpio 2.11 allows remote attackers to cause a denial of service via a large block value in a cpio archive.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-111-1, DSA-3111-1
NVD severitymedium (attack range: remote)
Debian Bugs772793

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
cpio (PTS)wheezy, wheezy (security)2.11+dfsg-0.1+deb7u2fixed
jessie (security), jessie2.11+dfsg-4.1+deb8u1fixed
buster, stretch, sid2.11+dfsg-6fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
cpiosource(unstable)2.11+dfsg-4medium772793
cpiosourcesqueeze2.11-4+deb6u1mediumDLA-111-1
cpiosourcewheezy2.11+dfsg-0.1+deb7u1mediumDSA-3111-1

Notes

http://lcamtuf.coredump.cx/afl/vulns/lesspipe-cpio-bad-write.cpio
https://savannah.gnu.org/bugs/?43709
http://git.savannah.gnu.org/cgit/cpio.git/commit/?id=746f3ff6 (fix buffer overflow)
http://git.savannah.gnu.org/cgit/cpio.git/commit/?id=54d1c42a (fix range checking of length of link name)
http://git.savannah.gnu.org/cgit/cpio.git/commit/?id=58df4f1b (fixup of former commit)
http://git.savannah.gnu.org/cgit/cpio.git/commit/?id=fd262d11 (fix null deref)
http://git.savannah.gnu.org/cgit/cpio.git/commit/?id=f6a8a2cb (fix test suite in former commit)

Search for package or bug name: Reporting problems