Integer Overflow or Wraparound Affecting cpio package, versions *
Snyk CVSS
Attack Complexity
High
User Interaction
Required
Confidentiality
High
Integrity
High
Availability
High
Threat Intelligence
EPSS
0.25% (65th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-CENTOS7-CPIO-2026901
- published 17 Aug 2021
- disclosed 6 Aug 2021
How to fix?
There is no fixed version for Centos:7
cpio
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream cpio
package and not the cpio
package as distributed by Centos
.
See How to fix?
for Centos:7
relevant fixed versions and status.
GNU cpio through 2.13 allows attackers to execute arbitrary code via a crafted pattern file, because of a dstring.c ds_fgetstr integer overflow that triggers an out-of-bounds heap write. NOTE: it is unclear whether there are common cases where the pattern file, associated with the -E option, is untrusted data.
References
- https://access.redhat.com/security/cve/CVE-2021-38185
- https://github.com/fangqyi/cpiopwn
- https://git.savannah.gnu.org/cgit/cpio.git/commit/?id=dd96882877721703e19272fe25034560b794061b
- https://lists.gnu.org/archive/html/bug-cpio/2021-08/msg00000.html
- https://lists.gnu.org/archive/html/bug-cpio/2021-08/msg00002.html
- https://access.redhat.com/errata/RHSA-2022:1991
- https://lists.debian.org/debian-lts-announce/2023/06/msg00007.html