Bugs fixes in "cpio"
Origin | Bug number | Title | Date fixed |
---|---|---|---|
CVE | CVE-2021-38185 | GNU cpio through 2.13 allows attackers to execute arbitrary code via a crafted pattern file, because of a dstring.c ds_fgetstr integer overflow that | 2021-09-08 |
CVE | CVE-2021-38185 | GNU cpio through 2.13 allows attackers to execute arbitrary code via a crafted pattern file, because of a dstring.c ds_fgetstr integer overflow that | 2021-09-08 |
CVE | CVE-2021-38185 | GNU cpio through 2.13 allows attackers to execute arbitrary code via a crafted pattern file, because of a dstring.c ds_fgetstr integer overflow that | 2021-09-08 |
CVE | CVE-2021-38185 | GNU cpio through 2.13 allows attackers to execute arbitrary code via a crafted pattern file, because of a dstring.c ds_fgetstr integer overflow that | 2021-09-08 |
CVE | CVE-2019-14866 | improper input validation when writing tar header fields leads to unexpect tar generation | 2019-11-06 |
CVE | CVE-2019-14866 | improper input validation when writing tar header fields leads to unexpect tar generation | 2019-11-06 |
CVE | CVE-2019-14866 | improper input validation when writing tar header fields leads to unexpect tar generation | 2019-11-06 |
CVE | CVE-2019-14866 | improper input validation when writing tar header fields leads to unexpect tar generation | 2019-11-06 |
CVE | CVE-2019-14866 | improper input validation when writing tar header fields leads to unexpect tar generation | 2019-11-06 |
CVE | CVE-2019-14866 | improper input validation when writing tar header fields leads to unexpect tar generation | 2019-11-06 |
About
-
Send Feedback to @ubuntu_updates