CVE-2021-38185

Name
CVE-2021-38185
Description
GNU cpio through 2.13 allows attackers to execute arbitrary code via a crafted pattern file, because of a dstring.c ds_fgetstr integer overflow that triggers an out-of-bounds heap write. NOTE: it is unclear whether there are common cases where the pattern file, associated with the -E option, is untrusted data.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
MISC https://github.com/fangqyi/cpiopwn
MISC https://lists.gnu.org/archive/html/bug-cpio/2021-08/msg00002.html
MISC https://lists.gnu.org/archive/html/bug-cpio/2021-08/msg00000.html
MISC https://git.savannah.gnu.org/cgit/cpio.git/commit/?id=dd96882877721703e19272fe25034560b794061b

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:gnu:cpio:*:*:*:*:*:*:*:* cpio >= None <= 2.13

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
cpio 3.14-community 2.13-r2 Stuart Cardall <developer@it-offshore.co.uk> fixed
cpio 3.15-community 2.13-r3 Stuart Cardall <developer@it-offshore.co.uk> fixed
cpio 3.16-community 2.13-r3 Stuart Cardall <developer@it-offshore.co.uk> fixed
cpio 3.17-community 2.13-r3 Stuart Cardall <developer@it-offshore.co.uk> fixed