An issue was discovered in klibc before 2.0.9. Multiple possible integer overflows in the cpio command on 32-bit systems may result in a buffer overflow or other security impact.
References
Configurations
History
21 Nov 2024, 06:06
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2021/04/30/1 - Mailing List, Release Notes, Third Party Advisory | |
References | () https://git.kernel.org/pub/scm/libs/klibc/klibc.git/commit/?id=9b1c91577aef7f2e72c3aa11a27749160bd278ff - Patch, Third Party Advisory | |
References | () https://kernel.org/pub/linux/libs/klibc/2.0/ - Release Notes, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2021/06/msg00025.html - Third Party Advisory | |
References | () https://lists.zytor.com/archives/klibc/2021-April/004593.html - Mailing List, Release Notes, Third Party Advisory |
Information
Published : 2021-04-30 06:15
Updated : 2024-11-21 06:06
NVD link : CVE-2021-31872
Mitre link : CVE-2021-31872
CVE.ORG link : CVE-2021-31872
JSON object : View
Products Affected
klibc_project
- klibc
debian
- debian_linux
CWE
CWE-190
Integer Overflow or Wraparound