Debian's cpio contains a path traversal vulnerability. This issue was introduced by reverting CVE-2015-1197 patches which had caused a regression in --no-absolute-filenames. Upstream has since provided a proper fix to --no-absolute-filenames.
References
| Link | Resource |
|---|---|
| http://www.openwall.com/lists/oss-security/2024/01/05/1 | Mailing List |
| https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059163 | Issue Tracking |
| https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7207 | Third Party Advisory |
| https://git.savannah.gnu.org/cgit/cpio.git/commit/?id=376d663340a9dc91c91a5849e5713f07571c1628 | Mailing List Patch |
| https://www.openwall.com/lists/oss-security/2023/12/21/8 | Mailing List |
| http://www.openwall.com/lists/oss-security/2024/01/05/1 | Mailing List |
| https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059163 | Issue Tracking |
| https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7207 | Third Party Advisory |
| https://git.savannah.gnu.org/cgit/cpio.git/commit/?id=376d663340a9dc91c91a5849e5713f07571c1628 | Mailing List Patch |
| https://www.openwall.com/lists/oss-security/2023/12/21/8 | Mailing List |
Configurations
History
26 Aug 2025, 17:19
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Gnu
Gnu cpio |
|
| CPE | cpe:2.3:a:gnu:cpio:2.13:*:*:*:*:*:*:* | |
| References | () http://www.openwall.com/lists/oss-security/2024/01/05/1 - Mailing List | |
| References | () https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059163 - Issue Tracking | |
| References | () https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7207 - Third Party Advisory | |
| References | () https://git.savannah.gnu.org/cgit/cpio.git/commit/?id=376d663340a9dc91c91a5849e5713f07571c1628 - Mailing List, Patch | |
| References | () https://www.openwall.com/lists/oss-security/2023/12/21/8 - Mailing List |
07 May 2025, 21:16
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-22 |
21 Nov 2024, 08:45
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://www.openwall.com/lists/oss-security/2024/01/05/1 - | |
| References | () https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059163 - | |
| References | () https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7207 - | |
| References | () https://git.savannah.gnu.org/cgit/cpio.git/commit/?id=376d663340a9dc91c91a5849e5713f07571c1628 - | |
| References | () https://www.openwall.com/lists/oss-security/2023/12/21/8 - | |
| Summary |
|
29 Feb 2024, 01:42
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-02-29 01:42
Updated : 2025-08-26 17:19
NVD link : CVE-2023-7207
Mitre link : CVE-2023-7207
CVE.ORG link : CVE-2023-7207
JSON object : View
Products Affected
gnu
- cpio
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
