Release date:
2026-04-28 09:21:49 UTC
Description:
* SECURITY UPDATE: directory traversal in cpio extraction
- debian/patches/CVE-2023-39810.patch: add FEATURE_PATH_TRAVERSAL_PROTECTION
config option, call strip_unsafe_prefix() in data_extract_all.c to prevent
path traversal via ../ in archive filenames. Covers cpio, ar, rpm.
- Enable CONFIG_FEATURE_PATH_TRAVERSAL_PROTECTION=y in all build configs.
- debian/patches/CVE-2023-39810.patch: replace `echo -e` with `printf` in
the new cpio path-traversal testcase so it is portable to dash (the
Ubuntu /bin/sh).
- debian/testsuite-linux.diff: skip the pre-existing
"cpio uses by default uid/gid" test, which is fragile in the pbuilder
chroot (id -u returns 0 but source files retain uid=1000 from the
build worker, causing a spurious mismatch).
- debian/patches/CVE-2023-39810.patch: include the "1 blocks" summary
line that busybox cpio -vi emits (to stderr, merged via 2>&1) at
end-of-archive in the expected output of the new path-traversal
testcase; the functional check (file not written, exit 0) already
passed but the string-match failed because 1.30.1 always prints
"N blocks", matching the pattern used by other cpio tests in
testsuite/cpio.tests.
- debian/testsuite-linux.diff: skip the pre-existing hostname-d-works
test when the pbuilder chroot cannot resolve its own hostname via DNS
(no /etc/hosts entry for the build host).
- CVE-2023-39810
Updated packages:
-
busybox_1.30.1-4ubuntu6.5+tuxcare.els1_amd64.deb
sha:51598372f0db0f4577b1ea80b7c54c720c48abb3
-
busybox-initramfs_1.30.1-4ubuntu6.5+tuxcare.els1_amd64.deb
sha:915b3bd3c9112ca4e0edfa77fe0c4060c08856b2
-
busybox-static_1.30.1-4ubuntu6.5+tuxcare.els1_amd64.deb
sha:f5b596d3a95f24cbc53c1a5b604f3ee862df3576
-
busybox-syslogd_1.30.1-4ubuntu6.5+tuxcare.els1_all.deb
sha:ab7a6de216a77323f7982124ef09f882620d3d66
-
udhcpc_1.30.1-4ubuntu6.5+tuxcare.els1_amd64.deb
sha:35e228d429cdded5435bd338b316e343d44a25af
-
udhcpd_1.30.1-4ubuntu6.5+tuxcare.els1_amd64.deb
sha:3f89beb4d9d272f8f335270917678d7c84e5ec69
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.