Debian's cpio contains a path traversal vulnerability. This issue was introduced by reverting CVE-2015-1197 patches which had caused a regression in --no-absolute-filenames. Upstream has since provided a proper fix to --no-absolute-filenames.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2024/01/05/1 | Mailing List |
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059163 | Issue Tracking |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7207 | Third Party Advisory |
https://git.savannah.gnu.org/cgit/cpio.git/commit/?id=376d663340a9dc91c91a5849e5713f07571c1628 | Mailing List Patch |
https://www.openwall.com/lists/oss-security/2023/12/21/8 | Mailing List |
http://www.openwall.com/lists/oss-security/2024/01/05/1 | Mailing List |
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059163 | Issue Tracking |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7207 | Third Party Advisory |
https://git.savannah.gnu.org/cgit/cpio.git/commit/?id=376d663340a9dc91c91a5849e5713f07571c1628 | Mailing List Patch |
https://www.openwall.com/lists/oss-security/2023/12/21/8 | Mailing List |
Configurations
History
26 Aug 2025, 17:19
Type | Values Removed | Values Added |
---|---|---|
First Time |
Gnu
Gnu cpio |
|
CPE | cpe:2.3:a:gnu:cpio:2.13:*:*:*:*:*:*:* | |
References | () http://www.openwall.com/lists/oss-security/2024/01/05/1 - Mailing List | |
References | () https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059163 - Issue Tracking | |
References | () https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7207 - Third Party Advisory | |
References | () https://git.savannah.gnu.org/cgit/cpio.git/commit/?id=376d663340a9dc91c91a5849e5713f07571c1628 - Mailing List, Patch | |
References | () https://www.openwall.com/lists/oss-security/2023/12/21/8 - Mailing List |
07 May 2025, 21:16
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-22 |
21 Nov 2024, 08:45
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2024/01/05/1 - | |
References | () https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059163 - | |
References | () https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7207 - | |
References | () https://git.savannah.gnu.org/cgit/cpio.git/commit/?id=376d663340a9dc91c91a5849e5713f07571c1628 - | |
References | () https://www.openwall.com/lists/oss-security/2023/12/21/8 - | |
Summary |
|
29 Feb 2024, 01:42
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-29 01:42
Updated : 2025-08-26 17:19
NVD link : CVE-2023-7207
Mitre link : CVE-2023-7207
CVE.ORG link : CVE-2023-7207
JSON object : View
Products Affected
gnu
- cpio
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')