Bug | Description |
---|
CVE-2021-38185 | GNU cpio through 2.13 allows attackers to execute arbitrary code via a ... |
CVE-2019-14866 | In all versions of cpio before 2.13 does not properly validate input f ... |
CVE-2016-2037 | The cpio_safer_name_suffix function in util.c in cpio 2.11 allows remo ... |
CVE-2015-1197 | cpio 2.11, when using the --no-absolute-filenames option, allows local ... |
CVE-2014-9112 | Heap-based buffer overflow in the process_copy_in function in GNU Cpio ... |
CVE-2010-0624 | Heap-based buffer overflow in the rmt_read__ function in lib/rtapelib. ... |
CVE-2007-4476 | Buffer overflow in the safer_name_suffix function in GNU tar has unspe ... |
CVE-2005-4268 | Buffer overflow in cpio 2.6-8.FC4 on 64-bit platforms, when creating a ... |
CVE-2005-1229 | Directory traversal vulnerability in cpio 2.6 and earlier allows remot ... |
CVE-2005-1111 | Race condition in cpio 2.6 and earlier allows local users to modify pe ... |
CVE-1999-1572 | cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operat ... |