Thomas Habets discovered that GNU cpio incorrectly handled certain inputs. An attacker could possibly use this issue to privilege escalation.
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "binaries": [ { "binary_version": "2.11+dfsg-1ubuntu1.2+esm1", "binary_name": "cpio" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "2.11+dfsg-5ubuntu1.1", "binary_name": "cpio" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "2.12+dfsg-6ubuntu0.18.04.1", "binary_name": "cpio" }, { "binary_version": "2.12+dfsg-6ubuntu0.18.04.1", "binary_name": "cpio-win32" } ] }