Описание
GNU cpio through 2.13 allows attackers to execute arbitrary code via a crafted pattern file, because of a dstring.c ds_fgetstr integer overflow that triggers an out-of-bounds heap write. NOTE: it is unclear whether there are common cases where the pattern file, associated with the -E option, is untrusted data.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | released | 2.12+dfsg-6ubuntu0.18.04.4 |
| devel | released | 2.13+dfsg-4ubuntu4 |
| esm-infra-legacy/trusty | released | 2.11+dfsg-1ubuntu1.2+esm2 |
| esm-infra/bionic | released | 2.12+dfsg-6ubuntu0.18.04.4 |
| esm-infra/focal | released | 2.13+dfsg-2ubuntu0.3 |
| esm-infra/xenial | released | 2.11+dfsg-5ubuntu1.1+esm1 |
| focal | released | 2.13+dfsg-2ubuntu0.3 |
| hirsute | released | 2.13+dfsg-4ubuntu0.3 |
| impish | released | 2.13+dfsg-4ubuntu4 |
| jammy | released | 2.13+dfsg-4ubuntu4 |
Показывать по
Ссылки на источники
6.8 Medium
CVSS2
7.8 High
CVSS3
Связанные уязвимости
GNU cpio through 2.13 allows attackers to execute arbitrary code via a crafted pattern file, because of a dstring.c ds_fgetstr integer overflow that triggers an out-of-bounds heap write. NOTE: it is unclear whether there are common cases where the pattern file, associated with the -E option, is untrusted data.
GNU cpio through 2.13 allows attackers to execute arbitrary code via a crafted pattern file, because of a dstring.c ds_fgetstr integer overflow that triggers an out-of-bounds heap write. NOTE: it is unclear whether there are common cases where the pattern file, associated with the -E option, is untrusted data.
GNU cpio through 2.13 allows attackers to execute arbitrary code via a crafted pattern file because of a dstring.c ds_fgetstr integer overflow that triggers an out-of-bounds heap write. NOTE: it is unclear whether there are common cases where the pattern file associated with the -E option is untrusted data.
GNU cpio through 2.13 allows attackers to execute arbitrary code via a ...
6.8 Medium
CVSS2
7.8 High
CVSS3