MGASA-2021-0423

Source
https://advisories.mageia.org/MGASA-2021-0423.html
Import Source
https://advisories.mageia.org/MGASA-2021-0423.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2021-0423
Related
Published
2021-09-23T04:49:29Z
Modified
2021-09-23T03:58:49Z
Summary
Updated cpio packages fix security vulnerability
Details

GNU cpio through 2.13 allows attackers to execute arbitrary code via a crafted pattern file, because of a dstring.c ds_fgetstr integer overflow that triggers an out-of-bounds heap write. (CVE-2021-38185).

References
Credits

Affected packages

Mageia:8 / cpio

Package

Name
cpio
Purl
pkg:rpm/mageia/cpio?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.13-5.1.mga8

Ecosystem specific

{
    "section": "core"
}