blob: 8caa9075972ec0732c5324cd935c44e47467546d [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200711-18">
<title>Cpio: Buffer overflow</title>
GNU cpio contains a buffer overflow vulnerability, possibly resulting in a
Denial of Service.
<product type="ebuild">cpio</product>
<announced>November 14, 2007</announced>
<revised>November 14, 2007: 01</revised>
<package name="app-arch/cpio" auto="yes" arch="*">
<unaffected range="ge">2.9-r1</unaffected>
<vulnerable range="lt">2.9-r1</vulnerable>
GNU cpio copies files into or out of a cpio or tar archive.
A buffer overflow vulnerability in the safer_name_suffix() function in
GNU cpio has been discovered.
<impact type="normal">
A remote attacker could entice a user to open a specially crafted
archive file resulting in a stack-based buffer overflow, possibly
crashing the application. It is disputed whether the execution of
arbitrary code is possible.
There is no known workaround at this time.
All GNU cpio users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=app-arch/cpio-2.9-r1&quot;</code>
<uri link="">CVE-2007-4476</uri>
<metadata tag="requester" timestamp="Wed, 07 Nov 2007 19:52:13 +0000">
<metadata tag="bugReady" timestamp="Wed, 07 Nov 2007 20:48:37 +0000">
<metadata tag="submitter" timestamp="Thu, 08 Nov 2007 18:58:10 +0000">