Vulnerabilities > GNU > Cpio > 1.3

DATE CVE VULNERABILITY TITLE RISK
2021-08-08 CVE-2021-38185 Integer Overflow or Wraparound vulnerability in GNU Cpio
GNU cpio through 2.13 allows attackers to execute arbitrary code via a crafted pattern file, because of a dstring.c ds_fgetstr integer overflow that triggers an out-of-bounds heap write.
local
low complexity
gnu CWE-190
7.8
2020-01-07 CVE-2019-14866 In all versions of cpio before 2.13 does not properly validate input files when generating TAR archives.
local
low complexity
gnu redhat
7.3
2010-03-15 CVE-2010-0624 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in GNU Cpio and TAR
Heap-based buffer overflow in the rmt_read__ function in lib/rtapelib.c in the rmt client functionality in GNU tar before 1.23 and GNU cpio before 2.11 allows remote rmt servers to cause a denial of service (memory corruption) or possibly execute arbitrary code by sending more data than was requested, related to archive filenames that contain a : (colon) character.
network
gnu CWE-119
6.8
2005-05-02 CVE-2005-1229 Directory Traversal vulnerability in CPIO Filename
Directory traversal vulnerability in cpio 2.6 and earlier allows remote attackers to write to arbitrary directories via a ..
local
low complexity
gnu
4.6
2005-05-02 CVE-2005-1111 Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in multiple products
Race condition in cpio 2.6 and earlier allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by cpio after the decompression is complete.
local
high complexity
gnu debian canonical CWE-367
4.7