Hi Pavel,

On Tue, Jun 6, 2017 at 11:43 AM, Pavel Raiskup <prais...@redhat.com> wrote:

> Hi Cedric, thanks for the report!
>
> On Monday, June 5, 2017 5:34:58 PM CEST Cedric Buissart wrote:
> > Looking at cpio, i found what seems to be a way to bypass the
> > --no-absolute-filenames option, which supposedly prevents data to be
> > written outside of the current folder.
>
> This sounds like real issue, according to 'info cpio':
>
>     '--no-absolute-filenames'
>          [*note copy-in::,*note copy-out::]
>          Create all files relative to the current directory in copy-in
> mode,
>          even if they have an absolute file name in the archive.
>
> > The very naive patch attached makes use of safer_name_suffix() to
> sanitize
> > symlink's value.
>
> The patch implements uncommon behavior among archivers.  Extracting the
> absolute symlink to directory _is not_ an issue (it is completely safe
> operation); the following extraction of files through this symlink *might
> be* an issue.  More importantly, valid extraction of absolute symlink is
> often really desired even with --no-absolute-filenames.
>
Good point, the patch was too naive, but at least was simple :D.


> In other words and IMO, if we were about to fix this issue - we should only
> refuse to extract files through symlinks.
>
Through any symlinks, or only those created by the archive itself ?
The latter might look less restrictive, but what happens if a local
attacker is able to create a symlink. Is it something that should be
considered ?

Thanks!




> Pavel
>
>


-- 
Cedric Buissart,
Product Security

Reply via email to