CVE-2016-2037

NameCVE-2016-2037
DescriptionThe cpio_safer_name_suffix function in util.c in cpio 2.11 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted cpio file.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-415-1, DSA-3483-1
NVD severitymedium (attack range: remote)
Debian Bugs812401

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
cpio (PTS)wheezy, wheezy (security)2.11+dfsg-0.1+deb7u2fixed
jessie (security), jessie2.11+dfsg-4.1+deb8u1fixed
stretch2.11+dfsg-6fixed
buster, sid2.12+dfsg-6fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
cpiosource(unstable)2.11+dfsg-5medium812401
cpiosourcejessie2.11+dfsg-4.1+deb8u1mediumDSA-3483-1
cpiosourcesqueeze2.11-4+deb6u2mediumDLA-415-1
cpiosourcewheezy2.11+dfsg-0.1+deb7u2mediumDSA-3483-1

Notes

http://www.openwall.com/lists/oss-security/2016/01/19/4
To reproduce and uncover the issue with unstable version compile with ASAN
Patch: https://lists.gnu.org/archive/html/bug-cpio/2016-01/msg00005.html

Search for package or bug name: Reporting problems