ArchLinux: 201503-22: cpio: directory traversal
Summary
It was reported that cpio is vulnerable to a directory traversal vulnerability when using the --no-absolute-filenames option. While extracting an archive, it will extract symlinks and then follow them if they are referenced in further entries. This can be exploited by a rogue archive to write to files outside the current directory.
Resolution
Upgrade to 2.11-6.
# pacman -Syu "cpio>=2.11-6"
The problem has not been fixed upstream but patches were available.
References
https://lists.gnu.org/archive/html/bug-cpio/2015-01/msg00000.html https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1197 https://bugs.archlinux.org/task/44173
![Dist Arch](/images/distros/dist-arch.png)
Workaround
None.