• [gentoo-announce] [ GLSA 202407-07 ] cpio: Arbitrary Code Execution

    From glsamaker@gentoo.org@21:1/5 to All on Mon Jul 1 08:20:02 2024
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Gentoo Linux Security Advisory GLSA 202407-07
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    https://security.gentoo.org/
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Severity: Normal
    Title: cpio: Arbitrary Code Execution
    Date: July 01, 2024
    Bugs: #807088
    ID: 202407-07

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Synopsis
    ========

    A vulnerability has been discovered in cpio, which can lead to arbitrary
    code execution.

    Background
    ==========

    cpio is a file archival tool which can also read and write tar files.

    Affected packages
    =================

    Package Vulnerable Unaffected
    ------------- ------------ ------------
    app-arch/cpio < 2.13-r1 >= 2.13-r1

    Description
    ===========

    Multiple vulnerabilities have been discovered in cpio. Please review the
    CVE identifiers referenced below for details.

    Impact
    ======

    GNU cpio allows attackers to execute arbitrary code via a crafted
    pattern file, because of a dstring.c ds_fgetstr integer overflow that
    triggers an out-of-bounds heap write. NOTE: it is unclear whether there
    are common cases where the pattern file, associated with the -E option,
    is untrusted data.

    Workaround
    ==========

    There is no known workaround at this time.

    Resolution
    ==========

    All cpio users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=app-arch/cpio-2.13-r1"

    References
    ==========

    [ 1 ] CVE-2016-2037
    https://nvd.nist.gov/vuln/detail/CVE-2016-2037
    [ 2 ] CVE-2019-14866
    https://nvd.nist.gov/vuln/detail/CVE-2019-14866
    [ 3 ] CVE-2021-38185
    https://nvd.nist.gov/vuln/detail/CVE-2021-38185

    Availability
    ============

    This GLSA and any updates to it are available for viewing at
    the Gentoo Security Website:

    https://security.gentoo.org/glsa/202407-07

    Concerns?
    =========

    Security is a primary focus of Gentoo Linux and ensuring the
    confidentiality and security of our users' machines is of utmost
    importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

    License
    =======

    Copyright 2024 Gentoo Foundation, Inc; referenced text
    belongs to its owner(s).

    The contents of this document are licensed under the
    Creative Commons - Attribution / Share Alike license.

    https://creativecommons.org/licenses/by-sa/2.5
    -----BEGIN PGP SIGNATURE-----

    iQIzBAEBCgAdFiEEpqTA6ABLMxh/aChGFMQkOaVy+9kFAmaCRbwACgkQFMQkOaVy +9l0YxAAsytVa5JlTZl1kmCrL8U+0XRVgZraqQGU1l3DH/AXBJrtZnsvEwa4PC7g p0q7Y3Hrq1ZXkquRxUY/mtFoF7dw3nVD3qOg9flwI6Yr90yiRJZaiYoCFzn1sNY8 G65hyePbDOkP6RdiLXFXUpuiJ61yaI2amuoRAOF0WvAQMNhwrDY8QSBHIr7AKNBn hRz/WIDtc93nQEu/tP7grMYcgAkSiS2mfU30NYBnnVLjvm0JyVQv1j8NlqDUP3xq ZNknciugZ/W8fv/gdwIvNm+mcT5+6l+JLZYZ2FIYKWqKVmMlTGObQ7GiV2SXW+Ri KgxEXlHSgH5YaQ3KMnq+rYDoKxp38opp16WdOjl+ch7+Czt51qKo7i7X08vMcDTu V2JP6PLqJ3hHrP5dA1WQEYVFphCcko4i4QNpzd1mTaFYQ7ThbGUUYR7iWNGkhwvB 0jfC3xU+DzctOe4/hy2kK/i4lAxRVEN2L5w70VnmTsx6i0CjVBfEPIk9DiVCd8MX jQMQWei72hdnnUR5Izls3cDLkBEP4LTOLDFAD/1osQ5sAy671wsnWiNSbQIBh4Ho 54ltBImbiA/NIpWEJmQDX/vuPaW2ygenxueYtFi31FWhEA7UfUHnmIZyneGThyA/ dWx/SPjQh3aSdTtt84cJKimh/E21bnDA10OQOTdqnXAVpsZqFtY=
    =jxzF
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)