An issue was discovered in klibc before 2.0.9. An integer overflow in the cpio command may result in a NULL pointer dereference on 64-bit systems.
References
Link | Resource |
---|---|
https://kernel.org/pub/linux/libs/klibc/2.0/ | Release Notes Third Party Advisory |
https://lists.zytor.com/archives/klibc/2021-April/004593.html | Mailing List Release Notes Third Party Advisory |
https://git.kernel.org/pub/scm/libs/klibc/klibc.git/commit/?id=2e48a12ab1e30d43498c2d53e878a11a1b5102d5 | Patch Third Party Advisory |
http://www.openwall.com/lists/oss-security/2021/04/30/1 | Mailing List Release Notes Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2021/06/msg00025.html | Mailing List Third Party Advisory |
Information
Published : 2021-04-29 23:15
Updated : 2022-04-18 20:52
NVD link : CVE-2021-31871
Mitre link : CVE-2021-31871
JSON object : View
CWE
CWE-190
Integer Overflow or Wraparound
Products Affected
debian
- debian_linux
klibc_project
- klibc