tarball: detect symlink cycles in extractFileFromTar#2232
Merged
Subserial merged 2 commits intogoogle:mainfrom Mar 17, 2026
Merged
tarball: detect symlink cycles in extractFileFromTar#2232Subserial merged 2 commits intogoogle:mainfrom
Subserial merged 2 commits intogoogle:mainfrom
Conversation
extractFileFromTar follows symlink and hard link entries recursively without tracking visited paths. A tar containing a link cycle (e.g., manifest.json -> config.json -> manifest.json) causes unbounded recursion until goroutine stack exhaustion crashes the process. Track visited paths during link resolution and return an error when a cycle is detected.
47bc359 to
ca49c05
Compare
Subserial
approved these changes
Mar 17, 2026
Codecov Report✅ All modified and coverable lines are covered by tests.
Additional details and impacted files@@ Coverage Diff @@
## main #2232 +/- ##
===========================================
- Coverage 71.67% 52.74% -18.94%
===========================================
Files 123 164 +41
Lines 9935 11113 +1178
===========================================
- Hits 7121 5861 -1260
- Misses 2115 4546 +2431
- Partials 699 706 +7 ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
extractFileFromTar follows symlinks by recursively calling itself with the link target, but doesn't track which paths it has already visited. A two-entry tar where manifest.json and config.json point at each other recurses until the goroutine stack hits ~1GB and the process crashes via runtime.abort().
This is reachable through tarball.Image(), tarball.ImageFromPath(), and the layer access methods -- basically anything that loads a Docker tarball. The fix passes a visited set through the recursive calls and returns an error when it sees a path twice.