Integer Overflow or Wraparound Affecting cpio package, versions <2.11+dfsg-1ubuntu1.2+esm2
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-UBUNTU1404-CPIO-1619991
- published 9 Aug 2021
- disclosed 8 Aug 2021
Introduced: 8 Aug 2021
CVE-2021-38185 Open this link in a new tabHow to fix?
Upgrade Ubuntu:14.04
cpio
to version 2.11+dfsg-1ubuntu1.2+esm2 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream cpio
package and not the cpio
package as distributed by Ubuntu
.
See How to fix?
for Ubuntu:14.04
relevant fixed versions and status.
GNU cpio through 2.13 allows attackers to execute arbitrary code via a crafted pattern file, because of a dstring.c ds_fgetstr integer overflow that triggers an out-of-bounds heap write. NOTE: it is unclear whether there are common cases where the pattern file, associated with the -E option, is untrusted data.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2021-38185
- https://github.com/fangqyi/cpiopwn
- https://git.savannah.gnu.org/cgit/cpio.git/commit/?id=dd96882877721703e19272fe25034560b794061b
- https://lists.gnu.org/archive/html/bug-cpio/2021-08/msg00000.html
- https://lists.gnu.org/archive/html/bug-cpio/2021-08/msg00002.html
- https://lists.debian.org/debian-lts-announce/2023/06/msg00007.html