Bug 156313 - (CVE-2005-1229) CVE-2005-1229 cpio directory traversal issue
CVE-2005-1229 cpio directory traversal issue
Status: CLOSED WONTFIX
Product: Red Hat Enterprise Linux 4
Classification: Red Hat
Component: cpio (Show other bugs)
4.0
All Linux
medium Severity low
: ---
: ---
Assigned To: Peter Vrabec
Brock Organ
impact=low,public=20050420,source=cve...
: Security
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2005-04-28 16:43 EDT by Josh Bressers
Modified: 2011-01-26 12:48 EST (History)
0 users

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2005-10-26 10:29:34 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)
fix candidate (6.38 KB, patch)
2005-06-02 05:49 EDT, Peter Vrabec
no flags Details | Diff

  None (edit)
Description Josh Bressers 2005-04-28 16:43:51 EDT
Directory traversal vulnerability in cpio 2.6 and earlier allows remote
attackers to write to arbitrary directories via a .. (dot dot) in a cpio file.
Comment 1 Josh Bressers 2005-04-28 16:44:12 EDT
This issue should also affect RHEL2.1 and RHEL3
Comment 2 Josh Bressers 2005-04-28 16:44:58 EDT
Here's the original post:
http://marc.theaimsgroup.com/?l=bugtraq&m=111403177526312&w=2
Comment 3 Peter Vrabec 2005-06-02 05:49:35 EDT
Created attachment 115079 [details]
fix candidate

Replace option --no-absolute-filenames	with --absolute-filenames
Not allow insecure filenames like "/tmp/../../etc/cron/..." ( strip
"/tmp/../../")

but there is a still problem with symlinks in cpio
http://lists.gnu.org/archive/html/bug-cpio/2005-05/msg00003.html
Comment 4 Mark J. Cox (Product Security) 2005-10-26 10:29:34 EDT
This is a funtionality change to fix something that is defined, documented
behaviour.  Therefore a security team review on 20051026 decided this should be
marked as WONTFIX

Note You need to log in before you can comment on or make changes to this bug.