GNU cpio copies files into or out of a cpio or tar archive. The archive can be another file on the disk, a magnetic tape, or a pipe.
Security Fix(es):
GNU cpio through 2.13 allows attackers to execute arbitrary code via a crafted pattern file, because of a dstring.c ds_fgetstr integer overflow that triggers an out-of-bounds heap write. NOTE: it is unclear whether there are common cases where the pattern file, associated with the -E option, is untrusted data.(CVE-2021-38185)
{
"severity": "High"
}{
"noarch": [
"cpio-help-2.13-4.oe1.noarch.rpm"
],
"x86_64": [
"cpio-debugsource-2.13-4.oe1.x86_64.rpm",
"cpio-2.13-4.oe1.x86_64.rpm",
"cpio-debuginfo-2.13-4.oe1.x86_64.rpm"
],
"src": [
"cpio-2.13-4.oe1.src.rpm"
],
"aarch64": [
"cpio-2.13-4.oe1.aarch64.rpm",
"cpio-debuginfo-2.13-4.oe1.aarch64.rpm",
"cpio-debugsource-2.13-4.oe1.aarch64.rpm"
]
}
{
"noarch": [
"cpio-help-2.13-4.oe1.noarch.rpm"
],
"x86_64": [
"cpio-debugsource-2.13-4.oe1.x86_64.rpm",
"cpio-2.13-4.oe1.x86_64.rpm",
"cpio-debuginfo-2.13-4.oe1.x86_64.rpm"
],
"src": [
"cpio-2.13-4.oe1.src.rpm"
],
"aarch64": [
"cpio-2.13-4.oe1.aarch64.rpm",
"cpio-debuginfo-2.13-4.oe1.aarch64.rpm",
"cpio-debugsource-2.13-4.oe1.aarch64.rpm"
]
}