diff --git a/CVE-2021-29136.patch b/CVE-2021-29136.patch deleted file mode 100644 index ea0e0578d37305be2d689158d105a271e819fee2..0000000000000000000000000000000000000000 --- a/CVE-2021-29136.patch +++ /dev/null @@ -1,35 +0,0 @@ -From d9efc31daf2206f7d3fdb839863cf7a576a2eb57 Mon Sep 17 00:00:00 2001 -From: Aleksa Sarai -Date: Wed, 24 Mar 2021 00:17:06 +1100 -Subject: [PATCH] layer: don't permit / type to be changed on extraction - -If users can change the type of / to a symlink, they can cause umoci to -overwrite host files. This is obviously bad, and is not caught by the -rest of our directory escape detection code because the root itself has -been changed to a different directory. - -Fixes: CVE-2021-29136 -Reported-by: Robin Peraglie -Tested-by: Daniel Dao -Reviewed-by: Tycho Andersen -Signed-off-by: Aleksa Sarai ---- - oci/layer/tar_extract.go | 5 +++++ - 1 file changed, 5 insertions(+) - -diff --git a/oci/layer/tar_extract.go b/oci/layer/tar_extract.go -index 1b8c3d67..d7414105 100644 ---- a/oci/layer/tar_extract.go -+++ b/oci/layer/tar_extract.go -@@ -404,6 +404,11 @@ func (te *TarExtractor) UnpackEntry(root string, hdr *tar.Header, r io.Reader) ( - if filepath.Join("/", hdr.Name) == "/" { - // If we got an entry for the root, then unsafeDir is the full path. - unsafeDir, file = hdr.Name, "." -+ // If we're being asked to change the root type, bail because they may -+ // change it to a symlink which we could inadvertently follow. -+ if hdr.Typeflag != tar.TypeDir { -+ return errors.New("malicious tar entry -- refusing to change type of root directory") -+ } - } - dir, err := securejoin.SecureJoinVFS(root, unsafeDir, te.fsEval) - if err != nil { diff --git a/umoci.spec b/umoci.spec index 2e51e0a62938cf4ed55c1fcad8070363de012a7a..9506d2f525e0d56cd21c0864fb9c1e7bb0929859 100644 --- a/umoci.spec +++ b/umoci.spec @@ -3,14 +3,13 @@ %define tempdir github.com/openSUSE/umoci Name: umoci -Version: 0.4.5 -Release: 5 +Version: 0.4.7 +Release: 1 Summary: Open Container Image manipulation tool -License: Apache-2.0 +License: ISC and MIT and Apache-2.0 URL: https://github.com/opencontainers/umoci -Source0: https://github.com/opencontainers/umoci/archive/v0.4.5.tar.gz +Source0: https://github.com/opencontainers/umoci/archive/v0.4.7.tar.gz Source1: https://github.com/cpuguy83/go-md2man/archive/v1.0.10.tar.gz -Patch0: CVE-2021-29136.patch BuildRequires: fdupes go >= 1.6 %description @@ -35,7 +34,7 @@ mkdir -pv $HOME/go/src/%{tempdir} rm -rf $HOME/go/src/%{tempdir}/* cp -ar * $HOME/go/src/%{tempdir} make umoci -make local-doc +make docs %install install -D -m 0755 %{name} %{buildroot}/%{_bindir}/%{name} @@ -55,6 +54,9 @@ done %{_mandir}/man1/umoci* %changelog +* Tue Jan 18 2022 SimpleUpdate Robot - 0.4.7-1 +- Upgrade to version 0.4.7 + * Fri Apr 16 2021 wangyue - 0.4.5-5 - Fix CVE-2021-29136 diff --git a/v0.4.5.tar.gz b/v0.4.5.tar.gz deleted file mode 100644 index 5cc9059519e1c6dd5f16d61b7ae5669db8c33b38..0000000000000000000000000000000000000000 Binary files a/v0.4.5.tar.gz and /dev/null differ diff --git a/v0.4.7.tar.gz b/v0.4.7.tar.gz new file mode 100644 index 0000000000000000000000000000000000000000..dffa19e82112d3fa695b21223fefeb22771e9535 Binary files /dev/null and b/v0.4.7.tar.gz differ