Integer Overflow or Wraparound Affecting cpio package, versions <0:2.12-11.el8
Snyk CVSS
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-CENTOS8-CPIO-1970858
- published 17 Aug 2021
- disclosed 6 Aug 2021
How to fix?
Upgrade Centos:8
cpio
to version 0:2.12-11.el8 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream cpio
package and not the cpio
package as distributed by Centos
.
See How to fix?
for Centos:8
relevant fixed versions and status.
GNU cpio through 2.13 allows attackers to execute arbitrary code via a crafted pattern file, because of a dstring.c ds_fgetstr integer overflow that triggers an out-of-bounds heap write. NOTE: it is unclear whether there are common cases where the pattern file, associated with the -E option, is untrusted data.
References
- https://access.redhat.com/security/cve/CVE-2021-38185
- https://github.com/fangqyi/cpiopwn
- https://git.savannah.gnu.org/cgit/cpio.git/commit/?id=dd96882877721703e19272fe25034560b794061b
- https://lists.gnu.org/archive/html/bug-cpio/2021-08/msg00000.html
- https://lists.gnu.org/archive/html/bug-cpio/2021-08/msg00002.html
- https://access.redhat.com/errata/RHSA-2022:1991
- https://lists.debian.org/debian-lts-announce/2023/06/msg00007.html