593589
From 840e7dad513b86f454573ad415701c0199f78d30 Mon Sep 17 00:00:00 2001
593589
From: TomSweeneyRedHat <tsweeney@redhat.com>
593589
Date: Tue, 24 Mar 2020 20:10:22 -0400
593589
Subject: [PATCH] Fix potential CVE in tarfile w/ symlink
593589
593589
Stealing @nalind 's workaround to avoid refetching
593589
content after a file read failure.  Under the right
593589
circumstances that could be a symlink to a file meant
593589
to overwrite a good file with bad data.
593589
593589
Testing:
593589
```
593589
goodstuff
593589
593589
[1] 14901
593589
593589
127.0.0.1 - - [24/Mar/2020 20:15:50] "GET / HTTP/1.1" 200 -
593589
127.0.0.1 - - [24/Mar/2020 20:15:50] "GET / HTTP/1.1" 200 -
593589
no FROM statement found
593589
593589
goodstuff
593589
```
593589
593589
Signed-off-by: TomSweeneyRedHat <tsweeney@redhat.com>
593589
---
593589
 imagebuildah/util.go | 5 +++--
593589
 1 file changed, 3 insertions(+), 2 deletions(-)
593589
593589
diff --git a/imagebuildah/util.go b/imagebuildah/util.go
593589
index 29ea60970..5f14c9883 100644
593589
--- a/vendor/github.com/containers/buildah/imagebuildah/util.go
593589
+++ b/vendor/github.com/containers/buildah/imagebuildah/util.go
593589
@@ -14,6 +14,7 @@ import (
593589
 
593589
 	"github.com/containers/buildah"
593589
 	"github.com/containers/storage/pkg/chrootarchive"
593589
+	"github.com/containers/storage/pkg/ioutils"
593589
 	"github.com/opencontainers/runtime-spec/specs-go"
593589
 	"github.com/pkg/errors"
593589
 	"github.com/sirupsen/logrus"
593589
@@ -57,7 +58,7 @@ func downloadToDirectory(url, dir string) error {
593589
 		}
593589
 		dockerfile := filepath.Join(dir, "Dockerfile")
593589
 		// Assume this is a Dockerfile
593589
-		if err := ioutil.WriteFile(dockerfile, body, 0600); err != nil {
593589
+		if err := ioutils.AtomicWriteFile(dockerfile, body, 0600); err != nil {
593589
 			return errors.Wrapf(err, "Failed to write %q to %q", url, dockerfile)
593589
 		}
593589
 	}
593589
@@ -75,7 +76,7 @@ func stdinToDirectory(dir string) error {
593589
 	if err := chrootarchive.Untar(reader, dir, nil); err != nil {
593589
 		dockerfile := filepath.Join(dir, "Dockerfile")
593589
 		// Assume this is a Dockerfile
593589
-		if err := ioutil.WriteFile(dockerfile, b, 0600); err != nil {
593589
+		if err := ioutils.AtomicWriteFile(dockerfile, b, 0600); err != nil {
593589
 			return errors.Wrapf(err, "Failed to write bytes to %q", dockerfile)
593589
 		}
593589
 	}