CVE-2014-9112

NameCVE-2014-9112
DescriptionHeap-based buffer overflow in the process_copy_in function in GNU Cpio 2.11 allows remote attackers to cause a denial of service via a large block value in a cpio archive.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-111-1, DSA-3111-1
Debian Bugs772793

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
cpio (PTS)jessie, jessie (lts)2.11+dfsg-4.1+deb8u4fixed
stretch (lts), stretch2.11+dfsg-6+deb9u1fixed
buster (security), buster, buster (lts)2.12+dfsg-9+deb10u1fixed
bullseye2.13+dfsg-7.1~deb11u1fixed
bookworm2.13+dfsg-7.1fixed
sid, trixie2.15+dfsg-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
cpiosourcesqueeze2.11-4+deb6u1DLA-111-1
cpiosourcewheezy2.11+dfsg-0.1+deb7u1DSA-3111-1
cpiosource(unstable)2.11+dfsg-4772793

Notes

http://lcamtuf.coredump.cx/afl/vulns/lesspipe-cpio-bad-write.cpio
https://savannah.gnu.org/bugs/?43709
http://git.savannah.gnu.org/cgit/cpio.git/commit/?id=746f3ff6 (fix buffer overflow)
http://git.savannah.gnu.org/cgit/cpio.git/commit/?id=54d1c42a (fix range checking of length of link name)
http://git.savannah.gnu.org/cgit/cpio.git/commit/?id=58df4f1b (fixup of former commit)
http://git.savannah.gnu.org/cgit/cpio.git/commit/?id=fd262d11 (fix null deref)
http://git.savannah.gnu.org/cgit/cpio.git/commit/?id=f6a8a2cb (fix test suite in former commit)

Search for package or bug name: Reporting problems