Debian Package Tracker
Register | Log in
Subscribe

cpio

GNU cpio -- a program to manage archives of files

Choose email to subscribe with

general
  • source: cpio (main)
  • version: 2.13+dfsg-7
  • maintainer: Anibal Monsalve Salazar (DMD) (LowNMU)
  • uploaders: Ruben Molina [DMD] – Chris Lamb [DMD]
  • arch: all any
  • std-ver: 4.5.0
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 2.11+dfsg-6
  • oldstable: 2.12+dfsg-9
  • stable: 2.13+dfsg-4
  • testing: 2.13+dfsg-7
  • unstable: 2.13+dfsg-7
versioned links
  • 2.11+dfsg-6: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.12+dfsg-9: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.13+dfsg-4: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.13+dfsg-7: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • cpio (38 bugs: 0, 26, 12, 0)
  • cpio-win32
action needed
The VCS repository is not up to date, push the missing commits. high
vcswatch reports that the current version of the package is not in its VCS.
Either you need to push your commits and/or your tags, or the information about the package's VCS are out of date. A common cause of the latter issue when using the Git VCS is not specifying the correct branch when the packaging is not in the default one (remote HEAD branch), which is usually "master" but can be modified in salsa.debian.org in the project's general settings with the "Default Branch" field). Alternatively the Vcs-Git field in debian/control can contain a "-b <branch-name>" suffix to indicate what branch is used for the Debian packaging.
Created: 2020-02-01 Last update: 2022-05-20 16:05
7 bugs tagged patch in the BTS normal
The BTS contains patches fixing 7 bugs, consider including or untagging them.
Created: 2021-08-14 Last update: 2022-05-24 07:01
Multiarch hinter reports 1 issue(s) low
There are issues with the multiarch metadata for this package.
  • cpio-win32 could be marked Multi-Arch: foreign
Created: 2016-09-14 Last update: 2022-05-24 03:35
2 low-priority security issues in buster low

There are 2 open security issues in buster.

2 issues left for the package maintainer to handle:
  • CVE-2019-14866: (needs triaging) In all versions of cpio before 2.13 does not properly validate input files when generating TAR archives. When cpio is used to create TAR archives from paths an attacker can write to, the resulting archive may contain files with permissions the attacker did not have or in paths he did not have access to. Extracting those archives from a high-privilege user without carefully reviewing them may lead to the compromise of the system.
  • CVE-2021-38185: (needs triaging) GNU cpio through 2.13 allows attackers to execute arbitrary code via a crafted pattern file, because of a dstring.c ds_fgetstr integer overflow that triggers an out-of-bounds heap write. NOTE: it is unclear whether there are common cases where the pattern file, associated with the -E option, is untrusted data.

You can find information about how to handle these issues in the security team's documentation.

Created: 2021-02-19 Last update: 2021-12-05 06:30
1 low-priority security issue in bullseye low

There is 1 open security issue in bullseye.

1 issue left for the package maintainer to handle:
  • CVE-2021-38185: (needs triaging) GNU cpio through 2.13 allows attackers to execute arbitrary code via a crafted pattern file, because of a dstring.c ds_fgetstr integer overflow that triggers an out-of-bounds heap write. NOTE: it is unclear whether there are common cases where the pattern file, associated with the -E option, is untrusted data.

You can find information about how to handle this issue in the security team's documentation.

Created: 2021-08-08 Last update: 2021-12-05 06:30
Build log checks report 1 warning low
Build log checks report 1 warning
Created: 2014-07-02 Last update: 2017-12-02 19:48
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.6.1 instead of 4.5.0).
Created: 2020-11-17 Last update: 2022-05-11 23:24
news
[rss feed]
  • [2021-08-24] cpio 2.13+dfsg-7 MIGRATED to testing (Debian testing watch)
  • [2021-08-22] Accepted cpio 2.13+dfsg-7 (source) into unstable (Anibal Monsalve Salazar)
  • [2021-08-13] Accepted cpio 2.13+dfsg-6 (source) into unstable (Anibal Monsalve Salazar)
  • [2021-08-10] Accepted cpio 2.13+dfsg-5 (source) into unstable (Anibal Monsalve Salazar)
  • [2020-09-22] cpio 2.13+dfsg-4 MIGRATED to testing (Debian testing watch)
  • [2020-09-17] Accepted cpio 2.13+dfsg-4 (source) into unstable (Anibal Monsalve Salazar)
  • [2020-07-08] Accepted cpio 2.13+dfsg-3 (source all amd64) into unstable (Anibal Monsalve Salazar)
  • [2020-02-06] cpio 2.13+dfsg-2 MIGRATED to testing (Debian testing watch)
  • [2020-02-01] Accepted cpio 2.13+dfsg-2 (source) into unstable (Chris Lamb)
  • [2019-11-26] cpio 2.13+dfsg-1 MIGRATED to testing (Debian testing watch)
  • [2019-11-20] Accepted cpio 2.13+dfsg-1 (source) into unstable (Chris Lamb)
  • [2019-11-05] Accepted cpio 2.11+dfsg-4.1+deb8u2 (source all amd64) into oldoldstable (Ola Lundqvist)
  • [2019-04-29] cpio 2.12+dfsg-9 MIGRATED to testing (Debian testing watch)
  • [2019-04-23] Accepted cpio 2.12+dfsg-9 (source all amd64) into unstable (Chris Lamb)
  • [2019-04-23] Accepted cpio 2.12+dfsg-8 (source all amd64) into unstable (Chris Lamb)
  • [2019-04-23] Accepted cpio 2.12+dfsg-7 (source all amd64) into unstable (Chris Lamb)
  • [2017-12-07] cpio 2.12+dfsg-6 MIGRATED to testing (Debian testing watch)
  • [2017-12-02] Accepted cpio 2.12+dfsg-6 (source all amd64) into unstable (Chris Lamb)
  • [2017-11-28] Accepted cpio 2.12+dfsg-5 (source) into experimental (Chris Lamb)
  • [2017-03-10] Accepted cpio 2.12+dfsg-4 (source) into experimental (Chris Lamb)
  • [2017-02-11] Accepted cpio 2.12+dfsg-3 (source) into experimental (Chris Lamb)
  • [2017-01-03] Accepted cpio 2.12+dfsg-2 (source all amd64) into experimental (Chris Lamb)
  • [2017-01-01] Accepted cpio 2.12+dfsg-1 (source) into experimental (Chris Lamb)
  • [2016-12-05] cpio 2.11+dfsg-6 MIGRATED to testing (Debian testing watch)
  • [2016-11-29] Accepted cpio 2.11+dfsg-6 (source all amd64) into unstable (Anibal Monsalve Salazar)
  • [2016-02-21] Accepted cpio 2.11+dfsg-0.1+deb7u2 (source all amd64) into oldstable-proposed-updates->oldstable-new, oldstable-proposed-updates (Salvatore Bonaccorso)
  • [2016-02-20] Accepted cpio 2.11+dfsg-4.1+deb8u1 (all source) into proposed-updates->stable-new, proposed-updates (Salvatore Bonaccorso)
  • [2016-02-20] cpio 2.11+dfsg-5 MIGRATED to testing (Debian testing watch)
  • [2016-02-15] Accepted cpio 2.11-4+deb6u2 (source all amd64) into squeeze-lts (Santiago Ruano Rincón)
  • [2016-02-14] Accepted cpio 2.11+dfsg-5 (source all amd64) into unstable (Anibal Monsalve Salazar)
  • 1
  • 2
bugs [bug history graph]
  • all: 40 42
  • RC: 0
  • I&N: 28
  • M&W: 12 14
  • F&P: 0
  • patch: 7
links
  • homepage
  • lintian
  • buildd: logs, checks, clang, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • l10n (-, 88)
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 2.13+dfsg-7
  • 12 bugs

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing