Bug 156313 (CVE-2005-1229)

Summary: CVE-2005-1229 cpio directory traversal issue
Product: [Other] Security Response Reporter: Josh Bressers <bressers>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED WONTFIX QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedKeywords: Security
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2005-10-26 14:29:34 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Attachments:
Description Flags
fix candidate none

Description Josh Bressers 2005-04-28 20:43:51 UTC
Directory traversal vulnerability in cpio 2.6 and earlier allows remote
attackers to write to arbitrary directories via a .. (dot dot) in a cpio file.

Comment 1 Josh Bressers 2005-04-28 20:44:12 UTC
This issue should also affect RHEL2.1 and RHEL3

Comment 2 Josh Bressers 2005-04-28 20:44:58 UTC
Here's the original post:
http://marc.theaimsgroup.com/?l=bugtraq&m=111403177526312&w=2

Comment 3 Peter Vrabec 2005-06-02 09:49:35 UTC
Created attachment 115079 [details]
fix candidate

Replace option --no-absolute-filenames	with --absolute-filenames
Not allow insecure filenames like "/tmp/../../etc/cron/..." ( strip
"/tmp/../../")

but there is a still problem with symlinks in cpio
http://lists.gnu.org/archive/html/bug-cpio/2005-05/msg00003.html

Comment 4 Mark J. Cox 2005-10-26 14:29:34 UTC
This is a funtionality change to fix something that is defined, documented
behaviour.  Therefore a security team review on 20051026 decided this should be
marked as WONTFIX