From: Siddharth Doshi <[email protected]>

The patches are taken from LTS branch 20.10 of moby.

Upstream-Status: Backport from 
[https://github.com/moby/moby/commit/88c4b7690840044ce15489699294ec7c5dadf5dd]

Signed-off-by: Siddharth Doshi <[email protected]>
---
 recipes-containers/docker/docker-moby_git.bb  |   2 +
 .../docker/files/CVE-2024-41110_1.patch       | 177 ++++++++++++++++++
 .../docker/files/CVE-2024-41110_2.patch       |  99 ++++++++++
 3 files changed, 278 insertions(+)
 create mode 100644 recipes-containers/docker/files/CVE-2024-41110_1.patch
 create mode 100644 recipes-containers/docker/files/CVE-2024-41110_2.patch

diff --git a/recipes-containers/docker/docker-moby_git.bb 
b/recipes-containers/docker/docker-moby_git.bb
index 1331930e..b1b2cbb5 100644
--- a/recipes-containers/docker/docker-moby_git.bb
+++ b/recipes-containers/docker/docker-moby_git.bb
@@ -59,6 +59,8 @@ SRC_URI = "\
         file://CVE-2024-36620.patch;patchdir=src/import \
         file://CVE-2024-36621.patch;patchdir=src/import \
         file://CVE-2024-29018.patch;patchdir=src/import \
+        file://CVE-2024-41110_1.patch;patchdir=src/import \
+        file://CVE-2024-41110_2.patch;patchdir=src/import \
        "
 
 DOCKER_COMMIT = "${SRCREV_moby}"
diff --git a/recipes-containers/docker/files/CVE-2024-41110_1.patch 
b/recipes-containers/docker/files/CVE-2024-41110_1.patch
new file mode 100644
index 00000000..7f74348a
--- /dev/null
+++ b/recipes-containers/docker/files/CVE-2024-41110_1.patch
@@ -0,0 +1,177 @@
+From 88c4b7690840044ce15489699294ec7c5dadf5dd Mon Sep 17 00:00:00 2001
+From: Jameson Hyde <[email protected]>
+Date: Mon, 26 Nov 2018 14:15:22 -0500
+Subject: [PATCH] Authz plugin security fixes for 0-length content and path
+ validation Signed-off-by: Jameson Hyde <[email protected]>
+MIME-Version: 1.0
+Content-Type: text/plain; charset=UTF-8
+Content-Transfer-Encoding: 8bit
+
+fix comments
+
+(cherry picked from commit 9659c3a52bac57e615b5fb49b0652baca448643e)
+Signed-off-by: Paweł Gronowski <[email protected]>
+(cherry picked from commit 2ac8a479c53d9b8e67c55f1e283da9d85d2b3415)
+Signed-off-by: Paweł Gronowski <[email protected]>
+
+Upstream-Status: Backport from 
[https://github.com/moby/moby/commit/88c4b7690840044ce15489699294ec7c5dadf5dd]
+CVE: CVE-2024-41110
+Signed-off-by: Siddharth Doshi <[email protected]>
+---
+ pkg/authorization/authz.go           | 38 ++++++++++++++++++---
+ pkg/authorization/authz_unix_test.go | 49 ++++++++++++++++++++++++++--
+ 2 files changed, 80 insertions(+), 7 deletions(-)
+
+diff --git a/pkg/authorization/authz.go b/pkg/authorization/authz.go
+index 1eb44315dd..4c2e90b251 100644
+--- a/pkg/authorization/authz.go
++++ b/pkg/authorization/authz.go
+@@ -8,6 +8,8 @@ import (
+       "io"
+       "mime"
+       "net/http"
++      "net/url"
++      "regexp"
+       "strings"
+ 
+       "github.com/containerd/log"
+@@ -53,10 +55,23 @@ type Ctx struct {
+       authReq *Request
+ }
+ 
++func isChunked(r *http.Request) bool {
++      // RFC 7230 specifies that content length is to be ignored if 
Transfer-Encoding is chunked
++      if strings.ToLower(r.Header.Get("Transfer-Encoding")) == "chunked" {
++              return true
++      }
++      for _, v := range r.TransferEncoding {
++              if 0 == strings.Compare(strings.ToLower(v), "chunked") {
++                      return true
++              }
++      }
++      return false
++}
++
+ // AuthZRequest authorized the request to the docker daemon using authZ 
plugins
+ func (ctx *Ctx) AuthZRequest(w http.ResponseWriter, r *http.Request) error {
+       var body []byte
+-      if sendBody(ctx.requestURI, r.Header) && r.ContentLength > 0 && 
r.ContentLength < maxBodySize {
++      if sendBody(ctx.requestURI, r.Header) && (r.ContentLength > 0 || 
isChunked(r)) && r.ContentLength < maxBodySize {
+               var err error
+               body, r.Body, err = drainBody(r.Body)
+               if err != nil {
+@@ -109,7 +124,6 @@ func (ctx *Ctx) AuthZResponse(rm ResponseModifier, r 
*http.Request) error {
+       if sendBody(ctx.requestURI, rm.Header()) {
+               ctx.authReq.ResponseBody = rm.RawBody()
+       }
+-
+       for _, plugin := range ctx.plugins {
+               log.G(context.TODO()).Debugf("AuthZ response using plugin %s", 
plugin.Name())
+ 
+@@ -147,10 +161,26 @@ func drainBody(body io.ReadCloser) ([]byte, 
io.ReadCloser, error) {
+       return nil, newBody, err
+ }
+ 
++func isAuthEndpoint(urlPath string) (bool, error) {
++      // eg 
www.test.com/v1.24/auth/optional?optional1=something&optional2=something 
(version optional)
++      matched, err := regexp.MatchString(`^[^\/]+\/(v\d[\d\.]*\/)?auth.*`, 
urlPath)
++      if err != nil {
++              return false, err
++      }
++      return matched, nil
++}
++
+ // sendBody returns true when request/response body should be sent to 
AuthZPlugin
+-func sendBody(url string, header http.Header) bool {
++func sendBody(inURL string, header http.Header) bool {
++      u, err := url.Parse(inURL)
++      // Assume no if the URL cannot be parsed - an empty request will still 
be forwarded to the plugin and should be rejected
++      if err != nil {
++              return false
++      }
++
+       // Skip body for auth endpoint
+-      if strings.HasSuffix(url, "/auth") {
++      isAuth, err := isAuthEndpoint(u.Path)
++      if isAuth || err != nil {
+               return false
+       }
+ 
+diff --git a/pkg/authorization/authz_unix_test.go 
b/pkg/authorization/authz_unix_test.go
+index c9b18d96e9..275f1dd3d0 100644
+--- a/pkg/authorization/authz_unix_test.go
++++ b/pkg/authorization/authz_unix_test.go
+@@ -174,8 +174,8 @@ func TestDrainBody(t *testing.T) {
+ 
+ func TestSendBody(t *testing.T) {
+       var (
+-              url       = "nothing.com"
+               testcases = []struct {
++                      url         string
+                       contentType string
+                       expected    bool
+               }{
+@@ -219,15 +219,58 @@ func TestSendBody(t *testing.T) {
+                               contentType: "",
+                               expected:    false,
+                       },
++                      {
++                              url:         "nothing.com/auth",
++                              contentType: "",
++                              expected:    false,
++                      },
++                      {
++                              url:         "nothing.com/auth",
++                              contentType: "application/json;charset=UTF8",
++                              expected:    false,
++                      },
++                      {
++                              url:         "nothing.com/auth?p1=test",
++                              contentType: "application/json;charset=UTF8",
++                              expected:    false,
++                      },
++                      {
++                              url:         "nothing.com/test?p1=/auth",
++                              contentType: "application/json;charset=UTF8",
++                              expected:    true,
++                      },
++                      {
++                              url:         "nothing.com/something/auth",
++                              contentType: "application/json;charset=UTF8",
++                              expected:    true,
++                      },
++                      {
++                              url:         "nothing.com/auth/test",
++                              contentType: "application/json;charset=UTF8",
++                              expected:    false,
++                      },
++                      {
++                              url:         "nothing.com/v1.24/auth/test",
++                              contentType: "application/json;charset=UTF8",
++                              expected:    false,
++                      },
++                      {
++                              url:         "nothing.com/v1/auth/test",
++                              contentType: "application/json;charset=UTF8",
++                              expected:    false,
++                      },
+               }
+       )
+ 
+       for _, testcase := range testcases {
+               header := http.Header{}
+               header.Set("Content-Type", testcase.contentType)
++              if testcase.url == "" {
++                      testcase.url = "nothing.com"
++              }
+ 
+-              if b := sendBody(url, header); b != testcase.expected {
+-                      t.Fatalf("Unexpected Content-Type; Expected: %t, 
Actual: %t", testcase.expected, b)
++              if b := sendBody(testcase.url, header); b != testcase.expected {
++                      t.Fatalf("sendBody failed: url: %s, content-type: %s; 
Expected: %t, Actual: %t", testcase.url, testcase.contentType, 
testcase.expected, b)
+               }
+       }
+ }
+-- 
+2.44.4
+
diff --git a/recipes-containers/docker/files/CVE-2024-41110_2.patch 
b/recipes-containers/docker/files/CVE-2024-41110_2.patch
new file mode 100644
index 00000000..48f21b52
--- /dev/null
+++ b/recipes-containers/docker/files/CVE-2024-41110_2.patch
@@ -0,0 +1,99 @@
+From 8fc313c00169d14f1712d5661306d9e0c8838257 Mon Sep 17 00:00:00 2001
+From: Jameson Hyde <[email protected]>
+Date: Sat, 1 Dec 2018 11:25:49 -0500
+Subject: [PATCH 2/2] If url includes scheme, urlPath will drop hostname, which
+ would not match the auth check
+MIME-Version: 1.0
+Content-Type: text/plain; charset=UTF-8
+Content-Transfer-Encoding: 8bit
+
+Signed-off-by: Jameson Hyde <[email protected]>
+(cherry picked from commit 754fb8d9d03895ae3ab60d2ad778152b0d835206)
+Signed-off-by: Paweł Gronowski <[email protected]>
+(cherry picked from commit 5282cb25d09db924fa92fdb8fb7a9bd20bb845b7)
+Signed-off-by: Paweł Gronowski <[email protected]>
+
+Upstream-Status: Backport from 
[https://github.com/moby/moby/commit/7ff423cc1c991d8dc0a7b5d1d93e1cf3efaac169]
+CVE: CVE-2024-41110
+Signed-off-by: Siddharth Doshi <[email protected]>
+---
+ pkg/authorization/authz.go           |  6 ++---
+ pkg/authorization/authz_unix_test.go | 35 ++++++++++++++++++++++++++++
+ 2 files changed, 38 insertions(+), 3 deletions(-)
+
+diff --git a/pkg/authorization/authz.go b/pkg/authorization/authz.go
+index 4c2e90b251..d568a2b597 100644
+--- a/pkg/authorization/authz.go
++++ b/pkg/authorization/authz.go
+@@ -57,11 +57,11 @@ type Ctx struct {
+ 
+ func isChunked(r *http.Request) bool {
+       // RFC 7230 specifies that content length is to be ignored if 
Transfer-Encoding is chunked
+-      if strings.ToLower(r.Header.Get("Transfer-Encoding")) == "chunked" {
++      if strings.EqualFold(r.Header.Get("Transfer-Encoding"), "chunked") {
+               return true
+       }
+       for _, v := range r.TransferEncoding {
+-              if 0 == strings.Compare(strings.ToLower(v), "chunked") {
++              if strings.EqualFold(v, "chunked") {
+                       return true
+               }
+       }
+@@ -163,7 +163,7 @@ func drainBody(body io.ReadCloser) ([]byte, io.ReadCloser, 
error) {
+ 
+ func isAuthEndpoint(urlPath string) (bool, error) {
+       // eg 
www.test.com/v1.24/auth/optional?optional1=something&optional2=something 
(version optional)
+-      matched, err := regexp.MatchString(`^[^\/]+\/(v\d[\d\.]*\/)?auth.*`, 
urlPath)
++      matched, err := regexp.MatchString(`^[^\/]*\/(v\d[\d\.]*\/)?auth.*`, 
urlPath)
+       if err != nil {
+               return false, err
+       }
+diff --git a/pkg/authorization/authz_unix_test.go 
b/pkg/authorization/authz_unix_test.go
+index 275f1dd3d0..66b4d20452 100644
+--- a/pkg/authorization/authz_unix_test.go
++++ b/pkg/authorization/authz_unix_test.go
+@@ -259,6 +259,41 @@ func TestSendBody(t *testing.T) {
+                               contentType: "application/json;charset=UTF8",
+                               expected:    false,
+                       },
++                      {
++                              url:         "www.nothing.com/v1.24/auth/test",
++                              contentType: "application/json;charset=UTF8",
++                              expected:    false,
++                      },
++                      {
++                              url:         
"https://www.nothing.com/v1.24/auth/test";,
++                              contentType: "application/json;charset=UTF8",
++                              expected:    false,
++                      },
++                      {
++                              url:         
"http://nothing.com/v1.24/auth/test";,
++                              contentType: "application/json;charset=UTF8",
++                              expected:    false,
++                      },
++                      {
++                              url:         "www.nothing.com/test?p1=/auth",
++                              contentType: "application/json;charset=UTF8",
++                              expected:    true,
++                      },
++                      {
++                              url:         
"http://www.nothing.com/test?p1=/auth";,
++                              contentType: "application/json;charset=UTF8",
++                              expected:    true,
++                      },
++                      {
++                              url:         "www.nothing.com/something/auth",
++                              contentType: "application/json;charset=UTF8",
++                              expected:    true,
++                      },
++                      {
++                              url:         
"https://www.nothing.com/something/auth";,
++                              contentType: "application/json;charset=UTF8",
++                              expected:    true,
++                      },
+               }
+       )
+ 
+-- 
+2.44.4
+
-- 
2.34.1

-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#9578): 
https://lists.yoctoproject.org/g/meta-virtualization/message/9578
Mute This Topic: https://lists.yoctoproject.org/mt/117760264/21656
Group Owner: [email protected]
Unsubscribe: https://lists.yoctoproject.org/g/meta-virtualization/unsub 
[[email protected]]
-=-=-=-=-=-=-=-=-=-=-=-

  • [meta-virtualization][scarthgap... Siddharth Doshi via lists.yoctoproject.org

Reply via email to