Description
Heap-based buffer overflow in the process_copy_in function in GNU Cpio 2.11 allows remote attackers to cause a denial of service via a large block value in a cpio archive.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-111-1 | cpio security update |
Debian DSA |
DSA-3111-1 | cpio security update |
EUVD |
EUVD-2014-8938 | Heap-based buffer overflow in the process_copy_in function in GNU Cpio 2.11 allows remote attackers to cause a denial of service via a large block value in a cpio archive. |
Ubuntu USN |
USN-2456-1 | GNU cpio vulnerabilities |
References
History
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T13:33:13.652Z
Reserved: 2014-11-26T00:00:00.000Z
Link: CVE-2014-9112
No data.
Status : Modified
Published: 2014-12-02T16:59:05.760
Modified: 2026-05-06T22:30:45.220
Link: CVE-2014-9112
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN