GNU cpio copies files into or out of a cpio or tar archive. The archive can be another file on the disk, a magnetic tape, or a pipe.
Security Fix(es):
GNU cpio through 2.13 allows attackers to execute arbitrary code via a crafted pattern file, because of a dstring.c ds_fgetstr integer overflow that triggers an out-of-bounds heap write. NOTE: it is unclear whether there are common cases where the pattern file, associated with the -E option, is untrusted data.(CVE-2021-38185)
{ "severity": "High" }
{ "aarch64": [ "cpio-2.13-4.oe1.aarch64.rpm", "cpio-debuginfo-2.13-4.oe1.aarch64.rpm", "cpio-debugsource-2.13-4.oe1.aarch64.rpm" ], "x86_64": [ "cpio-debugsource-2.13-4.oe1.x86_64.rpm", "cpio-2.13-4.oe1.x86_64.rpm", "cpio-debuginfo-2.13-4.oe1.x86_64.rpm" ], "src": [ "cpio-2.13-4.oe1.src.rpm" ], "noarch": [ "cpio-help-2.13-4.oe1.noarch.rpm" ] }
{ "aarch64": [ "cpio-2.13-4.oe1.aarch64.rpm", "cpio-debuginfo-2.13-4.oe1.aarch64.rpm", "cpio-debugsource-2.13-4.oe1.aarch64.rpm" ], "x86_64": [ "cpio-debugsource-2.13-4.oe1.x86_64.rpm", "cpio-2.13-4.oe1.x86_64.rpm", "cpio-debuginfo-2.13-4.oe1.x86_64.rpm" ], "src": [ "cpio-2.13-4.oe1.src.rpm" ], "noarch": [ "cpio-help-2.13-4.oe1.noarch.rpm" ] }