UBUNTU-CVE-2023-7216

Source
https://ubuntu.com/security/CVE-2023-7216
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-7216.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2023-7216
Upstream
Published
2024-02-05T15:15:00Z
Modified
2026-01-20T19:06:42.609970Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L CVSS Calculator
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

A path traversal vulnerability was found in the CPIO utility. This issue could allow a remote unauthenticated attacker to trick a user into opening a specially crafted archive. During the extraction process, the archiver could follow symlinks outside of the intended directory, which allows files to be written in arbitrary directories through symlinks.

References

Affected packages

Ubuntu:18.04:LTS
cpio

Package

Name
cpio
Purl
pkg:deb/ubuntu/cpio@2.12+dfsg-6ubuntu0.18.04.4?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*
2.11+dfsg-6
2.12+dfsg-6
2.12+dfsg-6ubuntu0.18.04.1
2.12+dfsg-6ubuntu0.18.04.4

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "2.12+dfsg-6ubuntu0.18.04.4",
            "binary_name": "cpio"
        },
        {
            "binary_version": "2.12+dfsg-6ubuntu0.18.04.4",
            "binary_name": "cpio-win32"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-7216.json"
Ubuntu:20.04:LTS
cpio

Package

Name
cpio
Purl
pkg:deb/ubuntu/cpio@2.13+dfsg-2ubuntu0.4?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*
2.12+dfsg-9
2.12+dfsg-9ubuntu1
2.13+dfsg-1
2.13+dfsg-2
2.13+dfsg-2ubuntu0.3
2.13+dfsg-2ubuntu0.4

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "2.13+dfsg-2ubuntu0.4",
            "binary_name": "cpio"
        },
        {
            "binary_version": "2.13+dfsg-2ubuntu0.4",
            "binary_name": "cpio-win32"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-7216.json"
Ubuntu:22.04:LTS
cpio

Package

Name
cpio
Purl
pkg:deb/ubuntu/cpio@2.13+dfsg-7ubuntu0.1?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*
2.13+dfsg-4ubuntu4
2.13+dfsg-7
2.13+dfsg-7ubuntu0.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "2.13+dfsg-7ubuntu0.1",
            "binary_name": "cpio"
        },
        {
            "binary_version": "2.13+dfsg-7ubuntu0.1",
            "binary_name": "cpio-win32"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-7216.json"
Ubuntu:24.04:LTS
cpio

Package

Name
cpio
Purl
pkg:deb/ubuntu/cpio@2.15+dfsg-1ubuntu2?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*
2.13+dfsg-7.1
2.14+dfsg-1
2.15+dfsg-1
2.15+dfsg-1ubuntu1
2.15+dfsg-1ubuntu2

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "2.15+dfsg-1ubuntu2",
            "binary_name": "cpio"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-7216.json"
Ubuntu:25.10
cpio

Package

Name
cpio
Purl
pkg:deb/ubuntu/cpio@2.15+dfsg-2ubuntu1?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*
2.15+dfsg-2
2.15+dfsg-2ubuntu1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "2.15+dfsg-2ubuntu1",
            "binary_name": "cpio"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-7216.json"
Ubuntu:Pro:14.04:LTS
cpio

Package

Name
cpio
Purl
pkg:deb/ubuntu/cpio@2.11+dfsg-1ubuntu1.2+esm2?arch=source&distro=esm-infra-legacy/trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*
2.11+dfsg-1ubuntu1
2.11+dfsg-1ubuntu1.1
2.11+dfsg-1ubuntu1.2
2.11+dfsg-1ubuntu1.2+esm1
2.11+dfsg-1ubuntu1.2+esm2

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "2.11+dfsg-1ubuntu1.2+esm2",
            "binary_name": "cpio"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-7216.json"
Ubuntu:Pro:16.04:LTS
cpio

Package

Name
cpio
Purl
pkg:deb/ubuntu/cpio@2.11+dfsg-5ubuntu1.1+esm1?arch=source&distro=esm-infra/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*
2.11+dfsg-4.1ubuntu1
2.11+dfsg-5ubuntu1
2.11+dfsg-5ubuntu1.1
2.11+dfsg-5ubuntu1.1+esm1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "2.11+dfsg-5ubuntu1.1+esm1",
            "binary_name": "cpio"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-7216.json"