https://sourceware.org/bugzilla/show_bug.cgi?id=31250
Nick Clifton <nickc at redhat dot com> changed: What |Removed |Added ---------------------------------------------------------------------------- Resolution|--- |FIXED Status|ASSIGNED |RESOLVED --- Comment #9 from Nick Clifton <nickc at redhat dot com> --- (In reply to Amyspark from comment #8) >> "C:/windows/system32/<something>" - surely such a library would be a huge >> security risk ? > > That risk would exist only if an extractor used the path verbatim. I believe > it should be treated as untrusted input and sanitized as appropriate (e.g. > banish colons on Win32). Another issue, though outside of the scope of > binutils, is why would someone be storing object files in > C:/Windows/System32. Because that would be an excellent attack vector. Trick someone into installing a library containing something that they want, but also an extra element that is something nefarious, then have them extract the contents. The victim thinks that they are getting some update/new program/whatever but in the background they have also been compromised... Anyway, the patch is in, so I am going to close this PR for now. If the patch turns out to be insufficient, or the problem arises in a different format, please feel free to reopen this case. -- You are receiving this mail because: You are on the CC list for the bug.