Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1318562 - (CVE-2016-6321) CVE-2016-6321 tar: Bypassing the extract path name
CVE-2016-6321 tar: Bypassing the extract path name
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20161027,repor...
: Security
Depends On: 1389192
Blocks: 1318564
  Show dependency treegraph
 
Reported: 2016-03-17 05:03 EDT by Adam Mariš
Modified: 2017-03-09 19:41 EST (History)
7 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Adam Mariš 2016-03-17 05:03:30 EDT
It was found that GNU tar archiver can be tricked into extracting files and directories in the given destination, regardless of the path name(s) specified on the command line. GNU `tar' archiver attempts to avoid path traversal attacks by removing offending parts of the element name at extract. This sanitizing leads to a vulnerability where the attacker can bypass the path name(s) specified on the command line. The attacker can create a crafted tar archive that, if extracted by the victim, replaces files and directories the victim has access to in the target directory, regardless of the path name(s) specified on the command line.

External Reference:

https://sintonen.fi/advisories/tar-extract-pathname-bypass.txt
Comment 1 Adam Mariš 2016-03-17 05:03:34 EDT
Acknowledgments:

Name: Harry Sintonen
Comment 4 Stefan Cornelius 2016-04-05 08:23:10 EDT
Mitigation:

Use the "star" utility provided by the "star" package to process archives from untrusted sources.

Statement:

Red Hat Product Security has rated this issue as having Moderate security
impact, a future update may address this flaw. This issue did not affect the versions of star as shipped with Red Hat Enterprise Linux 5, 6, and 7.
Comment 7 Andrej Nemec 2016-10-27 03:22:05 EDT
Created tar tracking bugs for this issue:

Affects: fedora-all [bug 1389192]
Comment 8 Andrej Nemec 2016-10-27 03:22:34 EDT
Public via:

http://seclists.org/fulldisclosure/2016/Oct/96
Comment 10 Andrej Nemec 2016-10-31 05:40:27 EDT
Patch for this issue has been updated according to the researcher:

http://seclists.org/fulldisclosure/2016/Oct/102

Note You need to log in before you can comment on or make changes to this bug.