First published: Mon Feb 22 2016(Updated: )
The cpio_safer_name_suffix function in util.c in cpio 2.11 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted cpio file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU cpio | =2.11 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-2037 has a moderate severity level due to its potential to cause a denial of service.
To fix CVE-2016-2037, you should upgrade to a version of GNU cpio newer than 2.11 or apply relevant patches provided by your distribution.
CVE-2016-2037 affects GNU cpio version 2.11 and specific versions of Debian Linux 7.0 and 8.0.
CVE-2016-2037 is classified as an out-of-bounds write vulnerability.
Yes, CVE-2016-2037 can be exploited remotely through crafted cpio files.