Show filters
12 Total Results
Displaying 1-10 of 12
Sort by:
Attacker Value
Unknown
CVE-2023-7207
Disclosure Date: February 29, 2024 (last updated February 29, 2024)
Debian's cpio contains a path traversal vulnerability. This issue was introduced by reverting CVE-2015-1197 patches which had caused a regression in --no-absolute-filenames. Upstream has since provided a proper fix to --no-absolute-filenames.
0
Attacker Value
Unknown
CVE-2023-7216
Disclosure Date: February 05, 2024 (last updated September 19, 2024)
A path traversal vulnerability was found in the CPIO utility. This issue could allow a remote unauthenticated attacker to trick a user into opening a specially crafted archive. During the extraction process, the archiver could follow symlinks outside of the intended directory, which allows files to be written in arbitrary directories through symlinks.
0
Attacker Value
Unknown
CVE-2021-38185
Disclosure Date: August 08, 2021 (last updated February 23, 2025)
GNU cpio through 2.13 allows attackers to execute arbitrary code via a crafted pattern file, because of a dstring.c ds_fgetstr integer overflow that triggers an out-of-bounds heap write. NOTE: it is unclear whether there are common cases where the pattern file, associated with the -E option, is untrusted data.
0
Attacker Value
Unknown
CVE-2019-14866
Disclosure Date: January 07, 2020 (last updated February 21, 2025)
In all versions of cpio before 2.13 does not properly validate input files when generating TAR archives. When cpio is used to create TAR archives from paths an attacker can write to, the resulting archive may contain files with permissions the attacker did not have or in paths he did not have access to. Extracting those archives from a high-privilege user without carefully reviewing them may lead to the compromise of the system.
0
Attacker Value
Unknown
CVE-2016-2037
Disclosure Date: February 22, 2016 (last updated November 25, 2024)
The cpio_safer_name_suffix function in util.c in cpio 2.11 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted cpio file.
0
Attacker Value
Unknown
CVE-2015-1197
Disclosure Date: February 19, 2015 (last updated December 22, 2023)
cpio 2.11, when using the --no-absolute-filenames option, allows local users to write to arbitrary files via a symlink attack on a file in an archive.
0
Attacker Value
Unknown
CVE-2014-9112
Disclosure Date: December 02, 2014 (last updated October 05, 2023)
Heap-based buffer overflow in the process_copy_in function in GNU Cpio 2.11 allows remote attackers to cause a denial of service via a large block value in a cpio archive.
0
Attacker Value
Unknown
CVE-2010-4226
Disclosure Date: February 06, 2014 (last updated October 05, 2023)
cpio, as used in build 2007.05.10, 2010.07.28, and possibly other versions, allows remote attackers to overwrite arbitrary files via a symlink within an RPM package archive.
0
Attacker Value
Unknown
CVE-2010-0624
Disclosure Date: March 15, 2010 (last updated October 04, 2023)
Heap-based buffer overflow in the rmt_read__ function in lib/rtapelib.c in the rmt client functionality in GNU tar before 1.23 and GNU cpio before 2.11 allows remote rmt servers to cause a denial of service (memory corruption) or possibly execute arbitrary code by sending more data than was requested, related to archive filenames that contain a : (colon) character.
0
Attacker Value
Unknown
CVE-2005-4268
Disclosure Date: December 15, 2005 (last updated February 22, 2025)
Buffer overflow in cpio 2.6-8.FC4 on 64-bit platforms, when creating a cpio archive, allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a file whose size is represented by more than 8 digits.
0