Severity
7.8HIGH
EPSS
26.7%
top 3.66%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedAug 8
Latest updateAug 3

Description

GNU cpio through 2.13 allows attackers to execute arbitrary code via a crafted pattern file, because of a dstring.c ds_fgetstr integer overflow that triggers an out-of-bounds heap write. NOTE: it is unclear whether there are common cases where the pattern file, associated with the -E option, is untrusted data.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages2 packages

Debiancpio< 2.13+dfsg-7.1~deb11u1+3
NVDgnu/cpio2.13

Patches

🔴Vulnerability Details

3
GHSA
GHSA-pp74-ghrg-jwfh: GNU cpio through 22022-05-24
OSV
CVE-2021-38185: GNU cpio through 22021-08-08
CVEList
CVE-2021-38185: GNU cpio through 22021-08-07

📋Vendor Advisories

6
Ubuntu
GNU cpio vulnerability2023-08-03
Ubuntu
GNU cpio vulnerability2022-01-27
Ubuntu
GNU cpio vulnerability2021-09-08
Microsoft
GNU cpio through 2.13 allows attackers to execute arbitrary code via a crafted pattern file because of a dstring.c ds_fgetstr integer overflow that triggers an out-of-bounds heap write. NOTE: it is un2021-08-10
Red Hat
cpio: integer overflow in ds_fgetstr() in dstring.c can lead to an out-of-bounds write via a crafted pattern file2021-08-06