CVE-2021-31871

NameCVE-2021-31871
DescriptionAn issue was discovered in klibc before 2.0.9. An integer overflow in the cpio command may result in a NULL pointer dereference on 64-bit systems.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-2695-1
Debian Bugs989505

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
klibc (PTS)jessie2.0.4-2vulnerable
stretch (security), stretch (lts), stretch2.0.4-9+deb9u1fixed
buster2.0.6-1+deb10u1fixed
bullseye2.0.8-6.1fixed
bookworm2.0.12-1fixed
sid, trixie2.0.13-4fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
klibcsourcestretch2.0.4-9+deb9u1DLA-2695-1
klibcsourcebuster2.0.6-1+deb10u1
klibcsource(unstable)2.0.8-6989505

Notes

https://git.kernel.org/pub/scm/libs/klibc/klibc.git/commit/?id=2e48a12ab1e30d43498c2d53e878a11a1b5102d5
https://www.openwall.com/lists/oss-security/2021/04/30/1
[jessie] - klibc <no-dsa> (Minor issue; only used in initramfs and not dealing with untrusted data)

Search for package or bug name: Reporting problems