Integer overflow in RPM 4.12 and earlier allows remote attackers to execute arbitrary code via a crafted CPIO header in the payload section of an RPM file, which triggers a stack-based buffer overflow.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "4.11.1-3ubuntu0.1", "binary_name": "debugedit" }, { "binary_version": "4.11.1-3ubuntu0.1", "binary_name": "librpm-dbg" }, { "binary_version": "4.11.1-3ubuntu0.1", "binary_name": "librpm-dev" }, { "binary_version": "4.11.1-3ubuntu0.1", "binary_name": "librpm3" }, { "binary_version": "4.11.1-3ubuntu0.1", "binary_name": "librpmbuild3" }, { "binary_version": "4.11.1-3ubuntu0.1", "binary_name": "librpmio3" }, { "binary_version": "4.11.1-3ubuntu0.1", "binary_name": "librpmsign1" }, { "binary_version": "4.11.1-3ubuntu0.1", "binary_name": "python-rpm" }, { "binary_version": "4.11.1-3ubuntu0.1", "binary_name": "rpm" }, { "binary_version": "4.11.1-3ubuntu0.1", "binary_name": "rpm-common" }, { "binary_version": "4.11.1-3ubuntu0.1", "binary_name": "rpm-i18n" }, { "binary_version": "4.11.1-3ubuntu0.1", "binary_name": "rpm2cpio" } ] }