!12 Fix CVE-2021-29136
From: @wang_yue111 Reviewed-by: @small_leek Signed-off-by: @small_leek
This commit is contained in:
commit
492d065b7c
35
CVE-2021-29136.patch
Normal file
35
CVE-2021-29136.patch
Normal file
@ -0,0 +1,35 @@
|
||||
From d9efc31daf2206f7d3fdb839863cf7a576a2eb57 Mon Sep 17 00:00:00 2001
|
||||
From: Aleksa Sarai <cyphar@cyphar.com>
|
||||
Date: Wed, 24 Mar 2021 00:17:06 +1100
|
||||
Subject: [PATCH] layer: don't permit / type to be changed on extraction
|
||||
|
||||
If users can change the type of / to a symlink, they can cause umoci to
|
||||
overwrite host files. This is obviously bad, and is not caught by the
|
||||
rest of our directory escape detection code because the root itself has
|
||||
been changed to a different directory.
|
||||
|
||||
Fixes: CVE-2021-29136
|
||||
Reported-by: Robin Peraglie <robin@cure53.de>
|
||||
Tested-by: Daniel Dao <dqminh89@gmail.com>
|
||||
Reviewed-by: Tycho Andersen <tycho@tycho.pizza>
|
||||
Signed-off-by: Aleksa Sarai <cyphar@cyphar.com>
|
||||
---
|
||||
oci/layer/tar_extract.go | 5 +++++
|
||||
1 file changed, 5 insertions(+)
|
||||
|
||||
diff --git a/oci/layer/tar_extract.go b/oci/layer/tar_extract.go
|
||||
index 1b8c3d67..d7414105 100644
|
||||
--- a/oci/layer/tar_extract.go
|
||||
+++ b/oci/layer/tar_extract.go
|
||||
@@ -404,6 +404,11 @@ func (te *TarExtractor) UnpackEntry(root string, hdr *tar.Header, r io.Reader) (
|
||||
if filepath.Join("/", hdr.Name) == "/" {
|
||||
// If we got an entry for the root, then unsafeDir is the full path.
|
||||
unsafeDir, file = hdr.Name, "."
|
||||
+ // If we're being asked to change the root type, bail because they may
|
||||
+ // change it to a symlink which we could inadvertently follow.
|
||||
+ if hdr.Typeflag != tar.TypeDir {
|
||||
+ return errors.New("malicious tar entry -- refusing to change type of root directory")
|
||||
+ }
|
||||
}
|
||||
dir, err := securejoin.SecureJoinVFS(root, unsafeDir, te.fsEval)
|
||||
if err != nil {
|
||||
@ -4,12 +4,13 @@
|
||||
|
||||
Name: umoci
|
||||
Version: 0.4.5
|
||||
Release: 4
|
||||
Release: 5
|
||||
Summary: Open Container Image manipulation tool
|
||||
License: Apache-2.0
|
||||
URL: https://github.com/opencontainers/umoci
|
||||
Source0: https://github.com/opencontainers/umoci/archive/v0.4.5.tar.gz
|
||||
Source1: https://github.com/cpuguy83/go-md2man/archive/v1.0.10.tar.gz
|
||||
Patch0: CVE-2021-29136.patch
|
||||
BuildRequires: fdupes go >= 1.6
|
||||
|
||||
%description
|
||||
@ -54,6 +55,9 @@ done
|
||||
%{_mandir}/man1/umoci*
|
||||
|
||||
%changelog
|
||||
* Fri Apr 16 2021 wangyue <wangyue92@huawei.com> - 0.4.5-5
|
||||
- Fix CVE-2021-29136
|
||||
|
||||
* Tue Feb 9 2021 lingsheng <lingsheng@huawei.com> - 0.4.5-4
|
||||
- Fix unresolvable
|
||||
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user