[arch-security] [ASA-201503-22] cpio: directory traversal
Arch Linux Security Advisory ASA-201503-22 ========================================== Severity: Low Date : 2015-03-23 CVE-ID : CVE-2015-1197 Package : cpio Type : directory traversal Remote : No Link : https://wiki.archlinux.org/index.php/CVE Summary ======= The package cpio before version 2.11-6 is vulnerable to directory traversal. Resolution ========== Upgrade to 2.11-6. # pacman -Syu "cpio>=2.11-6" The problem has not been fixed upstream but patches were available. Workaround ========== None. Description =========== It was reported that cpio is vulnerable to a directory traversal vulnerability when using the --no-absolute-filenames option. While extracting an archive, it will extract symlinks and then follow them if they are referenced in further entries. This can be exploited by a rogue archive to write to files outside the current directory. Impact ====== An attacker is able to use a specially crafted archive containing a symlink to perform directory traversal resulting in arbitrary file write. References ========== https://lists.gnu.org/archive/html/bug-cpio/2015-01/msg00000.html https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1197 https://bugs.archlinux.org/task/44173
participants (1)
-
Levente Polyak