First published: Thu Jan 27 2022(Updated: )
USN-5064-1 fixed vulnerabilities in GNU cpio. This update provides the corresponding updates for Ubuntu 16.04 ESM. Original advisory details: Maverick Chung and Qiaoyi Fang discovered that cpio incorrectly handled certain pattern files. A remote attacker could use this issue to cause cpio to crash, resulting in a denial of service, or possibly execute arbitrary code.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/cpio | <2.11+dfsg-5ubuntu1.1+esm1 | 2.11+dfsg-5ubuntu1.1+esm1 |
=16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this GNU cpio vulnerability is USN-5064-2.
The severity level of USN-5064-2 is not provided in the information provided.
The software affected by this vulnerability is GNU cpio version 2.11+dfsg-5ubuntu1.1+esm1 on Ubuntu 16.04.
To fix the USN-5064-2 vulnerability, update the GNU cpio package to version 2.11+dfsg-5ubuntu1.1+esm1.
You can find more information about the USN-5064-2 vulnerability at the following references: [USN-5064-1](https://ubuntu.com/security/notices/USN-5064-1) and [USN-5064-3](https://ubuntu.com/security/notices/USN-5064-3).