Integer Overflow or Wraparound Affecting cpio package, versions <0:2.12-11.amzn2
Snyk CVSS
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-AMZN2-CPIO-3343019
- published 7 Mar 2023
- disclosed 8 Aug 2021
How to fix?
Upgrade Amazon-Linux:2
cpio
to version 0:2.12-11.amzn2 or higher.
This issue was patched in ALAS2-2023-1972
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream cpio
package and not the cpio
package as distributed by Amazon-Linux
.
See How to fix?
for Amazon-Linux:2
relevant fixed versions and status.
GNU cpio through 2.13 allows attackers to execute arbitrary code via a crafted pattern file, because of a dstring.c ds_fgetstr integer overflow that triggers an out-of-bounds heap write. NOTE: it is unclear whether there are common cases where the pattern file, associated with the -E option, is untrusted data.
References
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38185
- https://github.com/fangqyi/cpiopwn
- https://lists.gnu.org/archive/html/bug-cpio/2021-08/msg00002.html
- https://lists.gnu.org/archive/html/bug-cpio/2021-08/msg00000.html
- https://git.savannah.gnu.org/cgit/cpio.git/commit/?id=dd96882877721703e19272fe25034560b794061b
- https://lists.debian.org/debian-lts-announce/2023/06/msg00007.html