<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">cpio-2.13-3.3 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10697</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">cpio-2.13-3.3 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the cpio-2.13-3.3 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10697</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:10697</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-1197/</URL>
      <Description>SUSE CVE CVE-2015-1197 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-14866/</URL>
      <Description>SUSE CVE CVE-2019-14866 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-38185/</URL>
      <Description>SUSE CVE CVE-2021-38185 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="cpio-2.13-3.3">
      <FullProductName ProductID="cpio-2.13-3.3">cpio-2.13-3.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cpio-lang-2.13-3.3">
      <FullProductName ProductID="cpio-lang-2.13-3.3">cpio-lang-2.13-3.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cpio-mt-2.13-3.3">
      <FullProductName ProductID="cpio-mt-2.13-3.3">cpio-mt-2.13-3.3</FullProductName>
    </Branch>
    <Relationship ProductReference="cpio-2.13-3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:cpio-2.13-3.3">cpio-2.13-3.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="cpio-lang-2.13-3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:cpio-lang-2.13-3.3">cpio-lang-2.13-3.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="cpio-mt-2.13-3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:cpio-mt-2.13-3.3">cpio-mt-2.13-3.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">cpio 2.11, when using the --no-absolute-filenames option, allows local users to write to arbitrary files via a symlink attack on a file in an archive.</Note>
    </Notes>
    <CVE>CVE-2015-1197</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:cpio-2.13-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cpio-lang-2.13-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cpio-mt-2.13-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-1197.html</URL>
        <Description>CVE-2015-1197</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1077990</URL>
        <Description>SUSE Bug 1077990</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/913677</URL>
        <Description>SUSE Bug 913677</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In all versions of cpio before 2.13 does not properly validate input files when generating TAR archives. When cpio is used to create TAR archives from paths an attacker can write to, the resulting archive may contain files with permissions the attacker did not have or in paths he did not have access to. Extracting those archives from a high-privilege user without carefully reviewing them may lead to the compromise of the system.</Note>
    </Notes>
    <CVE>CVE-2019-14866</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:cpio-2.13-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cpio-lang-2.13-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cpio-mt-2.13-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-14866.html</URL>
        <Description>CVE-2019-14866</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1155199</URL>
        <Description>SUSE Bug 1155199</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">GNU cpio through 2.13 allows attackers to execute arbitrary code via a crafted pattern file, because of a dstring.c ds_fgetstr integer overflow that triggers an out-of-bounds heap write. NOTE: it is unclear whether there are common cases where the pattern file, associated with the -E option, is untrusted data.</Note>
    </Notes>
    <CVE>CVE-2021-38185</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:cpio-2.13-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cpio-lang-2.13-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:cpio-mt-2.13-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-38185.html</URL>
        <Description>CVE-2021-38185</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1189206</URL>
        <Description>SUSE Bug 1189206</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1189486</URL>
        <Description>SUSE Bug 1189486</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1192364</URL>
        <Description>SUSE Bug 1192364</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1193391</URL>
        <Description>SUSE Bug 1193391</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1200733</URL>
        <Description>SUSE Bug 1200733</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
