CVE-2021-31871

An issue was discovered in klibc before 2.0.9. An integer overflow in the cpio command may result in a NULL pointer dereference on 64-bit systems.
Configurations

Configuration 1 (hide)

cpe:2.3:a:klibc_project:klibc:*:*:*:*:*:*:x64:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

History

21 Nov 2024, 06:06

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2021/04/30/1 - Mailing List, Release Notes, Third Party Advisory () http://www.openwall.com/lists/oss-security/2021/04/30/1 - Mailing List, Release Notes, Third Party Advisory
References () https://git.kernel.org/pub/scm/libs/klibc/klibc.git/commit/?id=2e48a12ab1e30d43498c2d53e878a11a1b5102d5 - Patch, Third Party Advisory () https://git.kernel.org/pub/scm/libs/klibc/klibc.git/commit/?id=2e48a12ab1e30d43498c2d53e878a11a1b5102d5 - Patch, Third Party Advisory
References () https://kernel.org/pub/linux/libs/klibc/2.0/ - Release Notes, Third Party Advisory () https://kernel.org/pub/linux/libs/klibc/2.0/ - Release Notes, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2021/06/msg00025.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2021/06/msg00025.html - Mailing List, Third Party Advisory
References () https://lists.zytor.com/archives/klibc/2021-April/004593.html - Mailing List, Release Notes, Third Party Advisory () https://lists.zytor.com/archives/klibc/2021-April/004593.html - Mailing List, Release Notes, Third Party Advisory

Information

Published : 2021-04-30 06:15

Updated : 2024-11-21 06:06


NVD link : CVE-2021-31871

Mitre link : CVE-2021-31871

CVE.ORG link : CVE-2021-31871


JSON object : View

Products Affected

klibc_project

  • klibc

debian

  • debian_linux
CWE
CWE-190

Integer Overflow or Wraparound