cpio: Arbitrary Code Execution — GLSA 202407-07

A vulnerability has been discovered in cpio, which can lead to arbitrary code execution.

Affected packages

app-arch/cpio on all architectures
Affected versions < 2.13-r1
Unaffected versions >= 2.13-r1

Background

cpio is a file archival tool which can also read and write tar files.

Description

Multiple vulnerabilities have been discovered in cpio. Please review the CVE identifiers referenced below for details.

Impact

GNU cpio allows attackers to execute arbitrary code via a crafted pattern file, because of a dstring.c ds_fgetstr integer overflow that triggers an out-of-bounds heap write. NOTE: it is unclear whether there are common cases where the pattern file, associated with the -E option, is untrusted data.

Workaround

There is no known workaround at this time.

Resolution

All cpio users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-arch/cpio-2.13-r1"
 

References

Release date
July 01, 2024

Latest revision
July 01, 2024: 1

Severity
normal

Exploitable
local

Bugzilla entries