cpio: Arbitrary code execution — GLSA 201311-21

A heap-based buffer overflow in cpio might allow a remote rmt server to execute arbitrary code or cause a Denial of Service condition.

Affected packages

app-arch/cpio on all architectures
Affected versions < 2.11
Unaffected versions >= 2.11

Background

GNU cpio copies files into or out of a cpio or tar archive.

Description

Cpio contains a heap-based buffer overflow in the rmt_read__ function in lib/rtapelib.c.

Impact

A remote server could sending more data than was requested, related to archive filenames that contain a : (colon) character, possibly resulting in execution of arbitrary code or a Denial of Service condition.

Workaround

There is no known workaround at this time.

Resolution

All cpio users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-arch/cpio-2.11"
 

References

Release date
November 28, 2013

Latest revision
November 28, 2013: 1

Severity
normal

Exploitable
remote

Bugzilla entries