Описание
Heap-based buffer overflow in the process_copy_in function in GNU Cpio 2.11 allows remote attackers to cause a denial of service via a large block value in a cpio archive.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 2.11+dfsg-4ubuntu1 |
| esm-infra-legacy/trusty | released | 2.11+dfsg-1ubuntu1.1 |
| lucid | released | 2.10-1ubuntu2.1 |
| precise | released | 2.11-7ubuntu3.1 |
| trusty | released | 2.11+dfsg-1ubuntu1.1 |
| trusty/esm | released | 2.11+dfsg-1ubuntu1.1 |
| upstream | needed | |
| utopic | released | 2.11+dfsg-2ubuntu1.1 |
Показывать по
EPSS
5 Medium
CVSS2
Связанные уязвимости
Heap-based buffer overflow in the process_copy_in function in GNU Cpio 2.11 allows remote attackers to cause a denial of service via a large block value in a cpio archive.
Heap-based buffer overflow in the process_copy_in function in GNU Cpio 2.11 allows remote attackers to cause a denial of service via a large block value in a cpio archive.
Heap-based buffer overflow in the process_copy_in function in GNU Cpio ...
Heap-based buffer overflow in the process_copy_in function in GNU Cpio 2.11 allows remote attackers to cause a denial of service via a large block value in a cpio archive.
ELSA-2015-2108: cpio security and bug fix update (MODERATE)
EPSS
5 Medium
CVSS2