An issue was discovered in klibc before 2.0.9. An integer overflow in the cpio command may result in a NULL pointer dereference on 64-bit systems.
                
            References
                    | Link | Resource | 
|---|---|
| https://kernel.org/pub/linux/libs/klibc/2.0/ | Release Notes Third Party Advisory | 
| https://lists.zytor.com/archives/klibc/2021-April/004593.html | Mailing List Release Notes Third Party Advisory | 
| https://git.kernel.org/pub/scm/libs/klibc/klibc.git/commit/?id=2e48a12ab1e30d43498c2d53e878a11a1b5102d5 | Patch Third Party Advisory | 
| http://www.openwall.com/lists/oss-security/2021/04/30/1 | Mailing List Release Notes Third Party Advisory | 
| https://lists.debian.org/debian-lts-announce/2021/06/msg00025.html | Mailing List Third Party Advisory | 
Information
                Published : 2021-04-29 23:15
Updated : 2022-04-18 20:52
NVD link : CVE-2021-31871
Mitre link : CVE-2021-31871
JSON object : View
CWE
                
                    
                        
                        CWE-190
                        
            Integer Overflow or Wraparound
Products Affected
                debian
- debian_linux
 
klibc_project
- klibc
 


