[meta-virtualization] [m-c-s][PATCH 2/7] glusterfs: fix CVE-2018-10923

Chen Qi Qi.Chen at windriver.com
Tue Sep 25 19:36:26 PDT 2018


Backport patch to fix the following CVE.

CVE: CVE-2018-10923

Signed-off-by: Chen Qi <Qi.Chen at windriver.com>
---
 ...-disable-open-read-write-on-special-files.patch | 93 ++++++++++++++++++++++
 recipes-extended/glusterfs/glusterfs.inc           |  1 +
 2 files changed, 94 insertions(+)
 create mode 100644 recipes-extended/glusterfs/files/0002-posix-disable-open-read-write-on-special-files.patch

diff --git a/recipes-extended/glusterfs/files/0002-posix-disable-open-read-write-on-special-files.patch b/recipes-extended/glusterfs/files/0002-posix-disable-open-read-write-on-special-files.patch
new file mode 100644
index 0000000..06cd06c
--- /dev/null
+++ b/recipes-extended/glusterfs/files/0002-posix-disable-open-read-write-on-special-files.patch
@@ -0,0 +1,93 @@
+From 08dc006aac79ee1d1f6a5b7044fc973df7f00ed6 Mon Sep 17 00:00:00 2001
+From: Chen Qi <Qi.Chen at windriver.com>
+Date: Tue, 25 Sep 2018 14:02:01 +0800
+Subject: [PATCH 2/7] posix: disable open/read/write on special files
+
+In the file system, the responsibility w.r.to the block and char device
+files is related to only support for 'creating' them (using mknod(2)).
+
+Once the device files are created, the read/write syscalls for the specific
+devices are handled by the device driver registered for the specific major
+number, and depending on the minor number, it knows where to read from.
+Hence, we are at risk of reading contents from devices which are handled
+by the host kernel on server nodes.
+
+By disabling open/read/write on the device file, we would be safe with
+the bypass one can achieve from client side (using gfapi)
+
+Fixes: bz#1625096
+
+Change-Id: I48c776b0af1cbd2a5240862826d3d8918601e47f
+Signed-off-by: Amar Tumballi <amarts at redhat.com>
+
+Upstream-Status: Backport
+
+Fix CVE-2018-10923
+Modified to suite the old version of glusterfs.
+
+Signed-off-by: Chen Qi <Qi.Chen at windriver.com>
+---
+ xlators/storage/posix/src/posix.c | 33 +++++++++++++++++++++++++++++++++
+ 1 file changed, 33 insertions(+)
+
+diff --git a/xlators/storage/posix/src/posix.c b/xlators/storage/posix/src/posix.c
+index b1a529b..506ae91 100644
+--- a/xlators/storage/posix/src/posix.c
++++ b/xlators/storage/posix/src/posix.c
+@@ -3091,6 +3091,17 @@ posix_open (call_frame_t *frame, xlator_t *this,
+         priv = this->private;
+         VALIDATE_OR_GOTO (priv, out);
+ 
++        if (loc->inode &&
++            ((loc->inode->ia_type == IA_IFBLK) ||
++             (loc->inode->ia_type == IA_IFCHR))) {
++                gf_msg (this->name, GF_LOG_ERROR, EINVAL,
++                        P_MSG_INVALID_ARGUMENT,
++                        "open received on a block/char file (%s)",
++                        uuid_utoa (loc->inode->gfid));
++                op_errno = EINVAL;
++                goto out;
++        }
++
+         MAKE_INODE_HANDLE (real_path, this, loc, &stbuf);
+         if (!real_path) {
+                 op_ret = -1;
+@@ -3180,6 +3191,17 @@ posix_readv (call_frame_t *frame, xlator_t *this,
+         priv = this->private;
+         VALIDATE_OR_GOTO (priv, out);
+ 
++        if (fd->inode &&
++            ((fd->inode->ia_type == IA_IFBLK) ||
++             (fd->inode->ia_type == IA_IFCHR))) {
++                gf_msg (this->name, GF_LOG_ERROR, EINVAL,
++                        P_MSG_INVALID_ARGUMENT,
++                        "readv received on a block/char file (%s)",
++                        uuid_utoa (fd->inode->gfid));
++                op_errno = EINVAL;
++                goto out;
++        }
++
+         ret = posix_fd_ctx_get (fd, this, &pfd, &op_errno);
+         if (ret < 0) {
+                 gf_msg (this->name, GF_LOG_WARNING, op_errno, P_MSG_PFD_NULL,
+@@ -3415,6 +3437,17 @@ posix_writev (call_frame_t *frame, xlator_t *this, fd_t *fd,
+ 
+         VALIDATE_OR_GOTO (priv, out);
+ 
++        if (fd->inode &&
++            ((fd->inode->ia_type == IA_IFBLK) ||
++             (fd->inode->ia_type == IA_IFCHR))) {
++                gf_msg (this->name, GF_LOG_ERROR, EINVAL,
++                        P_MSG_INVALID_ARGUMENT,
++                        "writev received on a block/char file (%s)",
++                        uuid_utoa (fd->inode->gfid));
++                op_errno = EINVAL;
++                goto out;
++        }
++
+         ret = posix_fd_ctx_get (fd, this, &pfd, &op_errno);
+         if (ret < 0) {
+                 gf_msg (this->name, GF_LOG_WARNING, ret, P_MSG_PFD_NULL,
+-- 
+2.7.4
+
diff --git a/recipes-extended/glusterfs/glusterfs.inc b/recipes-extended/glusterfs/glusterfs.inc
index ea5f2b7..e332872 100644
--- a/recipes-extended/glusterfs/glusterfs.inc
+++ b/recipes-extended/glusterfs/glusterfs.inc
@@ -24,6 +24,7 @@ SRC_URI += "file://glusterd.init \
             file://0002-server-auth-add-option-for-strict-authentication.patch \
             file://0003-glusterfs-access-trusted-peer-group-via-remote-host-.patch \
             file://0001-dict-handle-negative-key-value-length-while-unserial.patch \
+            file://0002-posix-disable-open-read-write-on-special-files.patch \
            "
 
 LICENSE = "(LGPLv3+ | GPLv2) & GPLv3+ & LGPLv3+ & GPLv2+ & LGPLv2+ & LGPLv2.1+ & Apache-2.0"
-- 
2.7.4



More information about the meta-virtualization mailing list