Debian's cpio contains a path traversal vulnerability. This issue was introduced by reverting CVE-2015-1197 patches which had caused a regression in --no-absolute-filenames. Upstream has since provided a proper fix to --no-absolute-filenames.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://git.savannah.gnu.org/cgit/cpio.git/commit/?id=376d663340a9dc91c91a5849e5713f07571c1628 | mailing list patch |
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059163 | issue tracking |
https://www.openwall.com/lists/oss-security/2023/12/21/8 | mailing list |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7207 | issue tracking third party advisory |
http://www.openwall.com/lists/oss-security/2024/01/05/1 | mailing list |