Thomas Habets discovered that GNU cpio incorrectly handled certain inputs. An attacker could possibly use this issue to privilege escalation.
{ "binaries": [ { "binary_version": "2.11+dfsg-1ubuntu1.2+esm1", "binary_name": "cpio" } ], "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro" }
{ "binaries": [ { "binary_version": "2.11+dfsg-5ubuntu1.1", "binary_name": "cpio" } ], "availability": "No subscription required" }
{ "binaries": [ { "binary_version": "2.12+dfsg-6ubuntu0.18.04.1", "binary_name": "cpio" }, { "binary_version": "2.12+dfsg-6ubuntu0.18.04.1", "binary_name": "cpio-win32" } ], "availability": "No subscription required" }