Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-38185

Опубликовано: 08 авг. 2021
Источник: debian
EPSS Средний

Описание

GNU cpio through 2.13 allows attackers to execute arbitrary code via a crafted pattern file, because of a dstring.c ds_fgetstr integer overflow that triggers an out-of-bounds heap write. NOTE: it is unclear whether there are common cases where the pattern file, associated with the -E option, is untrusted data.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
cpiofixed2.13+dfsg-5package
cpiofixed2.13+dfsg-7.1~deb11u1bullseyepackage
cpiono-dsastretchpackage

Примечания

  • https://git.savannah.gnu.org/cgit/cpio.git/commit/?id=dd96882877721703e19272fe25034560b794061b

  • https://github.com/fangqyi/cpiopwn

  • https://lists.gnu.org/archive/html/bug-cpio/2021-08/msg00000.html

  • https://lists.gnu.org/archive/html/bug-cpio/2021-08/msg00002.html

  • Regression: https://bugs.debian.org/992098

  • Regression fixed by: https://git.savannah.gnu.org/cgit/cpio.git/commit/?id=dfc801c44a93bed7b3951905b188823d6a0432c8

  • Regression #2: https://bugs.debian.org/992192

  • Regression #2 fixed by: https://git.savannah.gnu.org/cgit/cpio.git/commit/?id=236684f6deb3178043fe72a8e2faca538fa2aae1

EPSS

Процентиль: 96%
0.28795
Средний

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 4 года назад

GNU cpio through 2.13 allows attackers to execute arbitrary code via a crafted pattern file, because of a dstring.c ds_fgetstr integer overflow that triggers an out-of-bounds heap write. NOTE: it is unclear whether there are common cases where the pattern file, associated with the -E option, is untrusted data.

CVSS3: 7
redhat
почти 4 года назад

GNU cpio through 2.13 allows attackers to execute arbitrary code via a crafted pattern file, because of a dstring.c ds_fgetstr integer overflow that triggers an out-of-bounds heap write. NOTE: it is unclear whether there are common cases where the pattern file, associated with the -E option, is untrusted data.

CVSS3: 7.8
nvd
почти 4 года назад

GNU cpio through 2.13 allows attackers to execute arbitrary code via a crafted pattern file, because of a dstring.c ds_fgetstr integer overflow that triggers an out-of-bounds heap write. NOTE: it is unclear whether there are common cases where the pattern file, associated with the -E option, is untrusted data.

suse-cvrf
почти 4 года назад

Security update for cpio

suse-cvrf
почти 4 года назад

Security update for cpio

EPSS

Процентиль: 96%
0.28795
Средний