An issue was discovered in klibc before 2.0.9. An integer overflow in the cpio command may result in a NULL pointer dereference on 64-bit systems.
References
Configurations
History
21 Nov 2024, 06:06
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2021/04/30/1 - Mailing List, Release Notes, Third Party Advisory | |
References | () https://git.kernel.org/pub/scm/libs/klibc/klibc.git/commit/?id=2e48a12ab1e30d43498c2d53e878a11a1b5102d5 - Patch, Third Party Advisory | |
References | () https://kernel.org/pub/linux/libs/klibc/2.0/ - Release Notes, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2021/06/msg00025.html - Mailing List, Third Party Advisory | |
References | () https://lists.zytor.com/archives/klibc/2021-April/004593.html - Mailing List, Release Notes, Third Party Advisory |
Information
Published : 2021-04-30 06:15
Updated : 2024-11-21 06:06
NVD link : CVE-2021-31871
Mitre link : CVE-2021-31871
CVE.ORG link : CVE-2021-31871
JSON object : View
Products Affected
klibc_project
- klibc
debian
- debian_linux
CWE
CWE-190
Integer Overflow or Wraparound