Lucene search

K
ubuntucveUbuntu.comUB:CVE-2021-38185
HistoryAug 08, 2021 - 12:00 a.m.

CVE-2021-38185

2021-08-0800:00:00
ubuntu.com
ubuntu.com
12

0.003 Low

EPSS

Percentile

64.8%

GNU cpio through 2.13 allows attackers to execute arbitrary code via a
crafted pattern file, because of a dstring.c ds_fgetstr integer overflow
that triggers an out-of-bounds heap write. NOTE: it is unclear whether
there are common cases where the pattern file, associated with the -E
option, is untrusted data.

Bugs

Notes

Author Note
mdeslaur second commit fixes a regression. There seems to still be a regression even with the second commit as it is causing the kernel to FTBFS. Also see debian bugs for regressions. the third commit likely fixes the kernel regressions
OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchcpio< 2.12+dfsg-6ubuntu0.18.04.4UNKNOWN
ubuntu20.04noarchcpio< 2.13+dfsg-2ubuntu0.3UNKNOWN
ubuntu21.04noarchcpio< 2.13+dfsg-4ubuntu0.3UNKNOWN
ubuntu21.10noarchcpio< 2.13+dfsg-4ubuntu4UNKNOWN
ubuntu22.04noarchcpio< 2.13+dfsg-4ubuntu4UNKNOWN
ubuntu22.10noarchcpio< 2.13+dfsg-4ubuntu4UNKNOWN
ubuntu23.04noarchcpio< 2.13+dfsg-4ubuntu4UNKNOWN
ubuntu14.04noarchcpio< 2.11+dfsg-1ubuntu1.2+esm2) Available with Ubuntu Pro or Ubuntu Pro (Infra-onlyUNKNOWN
ubuntu16.04noarchcpio< 2.11+dfsg-5ubuntu1.1+esm1) Available with Ubuntu Pro or Ubuntu Pro (Infra-onlyUNKNOWN