diff options
author | Khem Raj <raj.khem@gmail.com> | 2022-08-14 15:20:32 -0700 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2022-08-16 14:57:58 +0100 |
commit | 61929f05d78553b9759d15f88ba8fda5accafd1b (patch) | |
tree | a52c04bdc247a3392d66dc2a74e9be133036e0e5 | |
parent | 6baf9b07a8571c7b0a0b3f5635873059b92059ed (diff) | |
download | poky-61929f05d78553b9759d15f88ba8fda5accafd1b.tar.gz |
rsync: Upgrade to 3.2.5
Changlog is here [1]
[1] https://download.samba.org/pub/rsync/NEWS#3.2.5
(From OE-Core rev: 937a28a2a83abc3923cf2793eb79b0a1f770cd54)
Signed-off-by: Khem Raj <raj.khem@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
-rw-r--r-- | meta/recipes-devtools/rsync/files/CVE-2022-29154.patch | 372 | ||||
-rw-r--r-- | meta/recipes-devtools/rsync/rsync_3.2.5.bb (renamed from meta/recipes-devtools/rsync/rsync_3.2.4.bb) | 4 |
2 files changed, 1 insertions, 375 deletions
diff --git a/meta/recipes-devtools/rsync/files/CVE-2022-29154.patch b/meta/recipes-devtools/rsync/files/CVE-2022-29154.patch deleted file mode 100644 index e43b092ea8..0000000000 --- a/meta/recipes-devtools/rsync/files/CVE-2022-29154.patch +++ /dev/null | |||
@@ -1,372 +0,0 @@ | |||
1 | From b7231c7d02cfb65d291af74ff66e7d8c507ee871 Mon Sep 17 00:00:00 2001 | ||
2 | From: Wayne Davison <wayne@opencoder.net> | ||
3 | Date: Sun, 31 Jul 2022 16:55:34 -0700 | ||
4 | Subject: [PATCH] Some extra file-list safety checks. | ||
5 | |||
6 | Upstream-Status: Backport [https://github.com/WayneD/rsync/commit/b7231c7d02cfb65d291af74ff66e7d8c507ee871] | ||
7 | CVE: CVE-2022-29154 | ||
8 | Signed-off-by: Khem Raj <raj.khem@gmail.com> | ||
9 | --- | ||
10 | exclude.c | 130 ++++++++++++++++++++++++++++++++++++++++++++++++++++- | ||
11 | flist.c | 17 ++++++- | ||
12 | io.c | 4 ++ | ||
13 | main.c | 7 ++- | ||
14 | receiver.c | 11 +++-- | ||
15 | rsync.1.md | 44 ++++++++++++++++-- | ||
16 | 6 files changed, 202 insertions(+), 11 deletions(-) | ||
17 | |||
18 | --- a/exclude.c | ||
19 | +++ b/exclude.c | ||
20 | @@ -27,16 +27,22 @@ extern int am_server; | ||
21 | extern int am_sender; | ||
22 | extern int eol_nulls; | ||
23 | extern int io_error; | ||
24 | +extern int xfer_dirs; | ||
25 | +extern int recurse; | ||
26 | extern int local_server; | ||
27 | extern int prune_empty_dirs; | ||
28 | extern int ignore_perishable; | ||
29 | +extern int old_style_args; | ||
30 | +extern int relative_paths; | ||
31 | extern int delete_mode; | ||
32 | extern int delete_excluded; | ||
33 | extern int cvs_exclude; | ||
34 | extern int sanitize_paths; | ||
35 | extern int protocol_version; | ||
36 | +extern int list_only; | ||
37 | extern int module_id; | ||
38 | |||
39 | +extern char *filesfrom_host; | ||
40 | extern char curr_dir[MAXPATHLEN]; | ||
41 | extern unsigned int curr_dir_len; | ||
42 | extern unsigned int module_dirlen; | ||
43 | @@ -44,8 +50,10 @@ extern unsigned int module_dirlen; | ||
44 | filter_rule_list filter_list = { .debug_type = "" }; | ||
45 | filter_rule_list cvs_filter_list = { .debug_type = " [global CVS]" }; | ||
46 | filter_rule_list daemon_filter_list = { .debug_type = " [daemon]" }; | ||
47 | +filter_rule_list implied_filter_list = { .debug_type = " [implied]" }; | ||
48 | |||
49 | int saw_xattr_filter = 0; | ||
50 | +int trust_sender_filter = 0; | ||
51 | |||
52 | /* Need room enough for ":MODS " prefix plus some room to grow. */ | ||
53 | #define MAX_RULE_PREFIX (16) | ||
54 | @@ -292,6 +300,125 @@ static void add_rule(filter_rule_list *l | ||
55 | } | ||
56 | } | ||
57 | |||
58 | +/* Each arg the client sends to the remote sender turns into an implied include | ||
59 | + * that the receiver uses to validate the file list from the sender. */ | ||
60 | +void add_implied_include(const char *arg) | ||
61 | +{ | ||
62 | + filter_rule *rule; | ||
63 | + int arg_len, saw_wild = 0, backslash_cnt = 0; | ||
64 | + int slash_cnt = 1; /* We know we're adding a leading slash. */ | ||
65 | + const char *cp; | ||
66 | + char *p; | ||
67 | + if (old_style_args || list_only || filesfrom_host != NULL) | ||
68 | + return; | ||
69 | + if (relative_paths) { | ||
70 | + cp = strstr(arg, "/./"); | ||
71 | + if (cp) | ||
72 | + arg = cp+3; | ||
73 | + } else { | ||
74 | + if ((cp = strrchr(arg, '/')) != NULL) | ||
75 | + arg = cp + 1; | ||
76 | + } | ||
77 | + arg_len = strlen(arg); | ||
78 | + if (arg_len) { | ||
79 | + if (strpbrk(arg, "*[?")) { | ||
80 | + /* We need to add room to escape backslashes if wildcard chars are present. */ | ||
81 | + cp = arg; | ||
82 | + while ((cp = strchr(cp, '\\')) != NULL) { | ||
83 | + arg_len++; | ||
84 | + cp++; | ||
85 | + } | ||
86 | + saw_wild = 1; | ||
87 | + } | ||
88 | + arg_len++; /* Leave room for the prefixed slash */ | ||
89 | + rule = new0(filter_rule); | ||
90 | + if (!implied_filter_list.head) | ||
91 | + implied_filter_list.head = implied_filter_list.tail = rule; | ||
92 | + else { | ||
93 | + rule->next = implied_filter_list.head; | ||
94 | + implied_filter_list.head = rule; | ||
95 | + } | ||
96 | + rule->rflags = FILTRULE_INCLUDE + (saw_wild ? FILTRULE_WILD : 0); | ||
97 | + p = rule->pattern = new_array(char, arg_len + 1); | ||
98 | + *p++ = '/'; | ||
99 | + cp = arg; | ||
100 | + while (*cp) { | ||
101 | + switch (*cp) { | ||
102 | + case '\\': | ||
103 | + backslash_cnt++; | ||
104 | + if (saw_wild) | ||
105 | + *p++ = '\\'; | ||
106 | + *p++ = *cp++; | ||
107 | + break; | ||
108 | + case '/': | ||
109 | + if (p[-1] == '/') /* This is safe because of the initial slash. */ | ||
110 | + break; | ||
111 | + if (relative_paths) { | ||
112 | + filter_rule const *ent; | ||
113 | + int found = 0; | ||
114 | + *p = '\0'; | ||
115 | + for (ent = implied_filter_list.head; ent; ent = ent->next) { | ||
116 | + if (ent != rule && strcmp(ent->pattern, rule->pattern) == 0) | ||
117 | + found = 1; | ||
118 | + } | ||
119 | + if (!found) { | ||
120 | + filter_rule *R_rule = new0(filter_rule); | ||
121 | + R_rule->rflags = FILTRULE_INCLUDE + (saw_wild ? FILTRULE_WILD : 0); | ||
122 | + R_rule->pattern = strdup(rule->pattern); | ||
123 | + R_rule->u.slash_cnt = slash_cnt; | ||
124 | + R_rule->next = implied_filter_list.head; | ||
125 | + implied_filter_list.head = R_rule; | ||
126 | + } | ||
127 | + } | ||
128 | + slash_cnt++; | ||
129 | + *p++ = *cp++; | ||
130 | + break; | ||
131 | + default: | ||
132 | + *p++ = *cp++; | ||
133 | + break; | ||
134 | + } | ||
135 | + } | ||
136 | + *p = '\0'; | ||
137 | + rule->u.slash_cnt = slash_cnt; | ||
138 | + arg = (const char *)rule->pattern; | ||
139 | + } | ||
140 | + | ||
141 | + if (recurse || xfer_dirs) { | ||
142 | + /* Now create a rule with an added "/" & "**" or "*" at the end */ | ||
143 | + rule = new0(filter_rule); | ||
144 | + if (recurse) | ||
145 | + rule->rflags = FILTRULE_INCLUDE | FILTRULE_WILD | FILTRULE_WILD2; | ||
146 | + else | ||
147 | + rule->rflags = FILTRULE_INCLUDE | FILTRULE_WILD; | ||
148 | + /* A +4 in the len leaves enough room for / * * \0 or / * \0 \0 */ | ||
149 | + if (!saw_wild && backslash_cnt) { | ||
150 | + /* We are appending a wildcard, so now the backslashes need to be escaped. */ | ||
151 | + p = rule->pattern = new_array(char, arg_len + backslash_cnt + 3 + 1); | ||
152 | + cp = arg; | ||
153 | + while (*cp) { | ||
154 | + if (*cp == '\\') | ||
155 | + *p++ = '\\'; | ||
156 | + *p++ = *cp++; | ||
157 | + } | ||
158 | + } else { | ||
159 | + p = rule->pattern = new_array(char, arg_len + 3 + 1); | ||
160 | + if (arg_len) { | ||
161 | + memcpy(p, arg, arg_len); | ||
162 | + p += arg_len; | ||
163 | + } | ||
164 | + } | ||
165 | + if (p[-1] != '/') | ||
166 | + *p++ = '/'; | ||
167 | + *p++ = '*'; | ||
168 | + if (recurse) | ||
169 | + *p++ = '*'; | ||
170 | + *p = '\0'; | ||
171 | + rule->u.slash_cnt = slash_cnt + 1; | ||
172 | + rule->next = implied_filter_list.head; | ||
173 | + implied_filter_list.head = rule; | ||
174 | + } | ||
175 | +} | ||
176 | + | ||
177 | /* This frees any non-inherited items, leaving just inherited items on the list. */ | ||
178 | static void pop_filter_list(filter_rule_list *listp) | ||
179 | { | ||
180 | @@ -718,7 +845,7 @@ static void report_filter_result(enum lo | ||
181 | : name_flags & NAME_IS_DIR ? "directory" | ||
182 | : "file"; | ||
183 | rprintf(code, "[%s] %sing %s %s because of pattern %s%s%s\n", | ||
184 | - w, actions[*w!='s'][!(ent->rflags & FILTRULE_INCLUDE)], | ||
185 | + w, actions[*w=='g'][!(ent->rflags & FILTRULE_INCLUDE)], | ||
186 | t, name, ent->pattern, | ||
187 | ent->rflags & FILTRULE_DIRECTORY ? "/" : "", type); | ||
188 | } | ||
189 | @@ -890,6 +1017,7 @@ static filter_rule *parse_rule_tok(const | ||
190 | } | ||
191 | switch (ch) { | ||
192 | case ':': | ||
193 | + trust_sender_filter = 1; | ||
194 | rule->rflags |= FILTRULE_PERDIR_MERGE | ||
195 | | FILTRULE_FINISH_SETUP; | ||
196 | /* FALL THROUGH */ | ||
197 | --- a/flist.c | ||
198 | +++ b/flist.c | ||
199 | @@ -73,6 +73,7 @@ extern int need_unsorted_flist; | ||
200 | extern int sender_symlink_iconv; | ||
201 | extern int output_needs_newline; | ||
202 | extern int sender_keeps_checksum; | ||
203 | +extern int trust_sender_filter; | ||
204 | extern int unsort_ndx; | ||
205 | extern uid_t our_uid; | ||
206 | extern struct stats stats; | ||
207 | @@ -83,8 +84,7 @@ extern char curr_dir[MAXPATHLEN]; | ||
208 | |||
209 | extern struct chmod_mode_struct *chmod_modes; | ||
210 | |||
211 | -extern filter_rule_list filter_list; | ||
212 | -extern filter_rule_list daemon_filter_list; | ||
213 | +extern filter_rule_list filter_list, implied_filter_list, daemon_filter_list; | ||
214 | |||
215 | #ifdef ICONV_OPTION | ||
216 | extern int filesfrom_convert; | ||
217 | @@ -986,6 +986,19 @@ static struct file_struct *recv_file_ent | ||
218 | exit_cleanup(RERR_UNSUPPORTED); | ||
219 | } | ||
220 | |||
221 | + if (*thisname != '.' || thisname[1] != '\0') { | ||
222 | + int filt_flags = S_ISDIR(mode) ? NAME_IS_DIR : NAME_IS_FILE; | ||
223 | + if (!trust_sender_filter /* a per-dir filter rule means we must trust the sender's filtering */ | ||
224 | + && filter_list.head && check_filter(&filter_list, FINFO, thisname, filt_flags) < 0) { | ||
225 | + rprintf(FERROR, "ERROR: rejecting excluded file-list name: %s\n", thisname); | ||
226 | + exit_cleanup(RERR_PROTOCOL); | ||
227 | + } | ||
228 | + if (implied_filter_list.head && check_filter(&implied_filter_list, FINFO, thisname, filt_flags) <= 0) { | ||
229 | + rprintf(FERROR, "ERROR: rejecting unrequested file-list name: %s\n", thisname); | ||
230 | + exit_cleanup(RERR_PROTOCOL); | ||
231 | + } | ||
232 | + } | ||
233 | + | ||
234 | if (inc_recurse && S_ISDIR(mode)) { | ||
235 | if (one_file_system) { | ||
236 | /* Room to save the dir's device for -x */ | ||
237 | --- a/io.c | ||
238 | +++ b/io.c | ||
239 | @@ -419,6 +419,7 @@ static void forward_filesfrom_data(void) | ||
240 | while (s != eob) { | ||
241 | if (*s++ == '\0') { | ||
242 | ff_xb.len = s - sob - 1; | ||
243 | + add_implied_include(sob); | ||
244 | if (iconvbufs(ic_send, &ff_xb, &iobuf.out, flags) < 0) | ||
245 | exit_cleanup(RERR_PROTOCOL); /* impossible? */ | ||
246 | write_buf(iobuf.out_fd, s-1, 1); /* Send the '\0'. */ | ||
247 | @@ -450,9 +451,12 @@ static void forward_filesfrom_data(void) | ||
248 | char *f = ff_xb.buf + ff_xb.pos; | ||
249 | char *t = ff_xb.buf; | ||
250 | char *eob = f + len; | ||
251 | + char *cur = t; | ||
252 | /* Eliminate any multi-'\0' runs. */ | ||
253 | while (f != eob) { | ||
254 | if (!(*t++ = *f++)) { | ||
255 | + add_implied_include(cur); | ||
256 | + cur = t; | ||
257 | while (f != eob && *f == '\0') | ||
258 | f++; | ||
259 | } | ||
260 | --- a/main.c | ||
261 | +++ b/main.c | ||
262 | @@ -89,6 +89,7 @@ extern int backup_dir_len; | ||
263 | extern int basis_dir_cnt; | ||
264 | extern int default_af_hint; | ||
265 | extern int stdout_format_has_i; | ||
266 | +extern int trust_sender_filter; | ||
267 | extern struct stats stats; | ||
268 | extern char *stdout_format; | ||
269 | extern char *logfile_format; | ||
270 | @@ -104,7 +105,7 @@ extern char curr_dir[MAXPATHLEN]; | ||
271 | extern char backup_dir_buf[MAXPATHLEN]; | ||
272 | extern char *basis_dir[MAX_BASIS_DIRS+1]; | ||
273 | extern struct file_list *first_flist; | ||
274 | -extern filter_rule_list daemon_filter_list; | ||
275 | +extern filter_rule_list daemon_filter_list, implied_filter_list; | ||
276 | |||
277 | uid_t our_uid; | ||
278 | gid_t our_gid; | ||
279 | @@ -635,6 +636,7 @@ static pid_t do_cmd(char *cmd, char *mac | ||
280 | #ifdef ICONV_CONST | ||
281 | setup_iconv(); | ||
282 | #endif | ||
283 | + trust_sender_filter = 1; | ||
284 | } else if (local_server) { | ||
285 | /* If the user didn't request --[no-]whole-file, force | ||
286 | * it on, but only if we're not batch processing. */ | ||
287 | @@ -1500,6 +1502,8 @@ static int start_client(int argc, char * | ||
288 | char *dummy_host; | ||
289 | int dummy_port = rsync_port; | ||
290 | int i; | ||
291 | + if (filesfrom_fd < 0) | ||
292 | + add_implied_include(remote_argv[0]); | ||
293 | /* For remote source, any extra source args must have either | ||
294 | * the same hostname or an empty hostname. */ | ||
295 | for (i = 1; i < remote_argc; i++) { | ||
296 | @@ -1523,6 +1527,7 @@ static int start_client(int argc, char * | ||
297 | if (!rsync_port && !*arg) /* Turn an empty arg into a dot dir. */ | ||
298 | arg = "."; | ||
299 | remote_argv[i] = arg; | ||
300 | + add_implied_include(arg); | ||
301 | } | ||
302 | } | ||
303 | |||
304 | --- a/receiver.c | ||
305 | +++ b/receiver.c | ||
306 | @@ -593,10 +593,13 @@ int recv_files(int f_in, int f_out, char | ||
307 | if (DEBUG_GTE(RECV, 1)) | ||
308 | rprintf(FINFO, "recv_files(%s)\n", fname); | ||
309 | |||
310 | - if (daemon_filter_list.head && (*fname != '.' || fname[1] != '\0') | ||
311 | - && check_filter(&daemon_filter_list, FLOG, fname, 0) < 0) { | ||
312 | - rprintf(FERROR, "attempt to hack rsync failed.\n"); | ||
313 | - exit_cleanup(RERR_PROTOCOL); | ||
314 | + if (daemon_filter_list.head && (*fname != '.' || fname[1] != '\0')) { | ||
315 | + int filt_flags = S_ISDIR(file->mode) ? NAME_IS_DIR : NAME_IS_FILE; | ||
316 | + if (check_filter(&daemon_filter_list, FLOG, fname, filt_flags) < 0) { | ||
317 | + rprintf(FERROR, "ERROR: rejecting file transfer request for daemon excluded file: %s\n", | ||
318 | + fname); | ||
319 | + exit_cleanup(RERR_PROTOCOL); | ||
320 | + } | ||
321 | } | ||
322 | |||
323 | #ifdef SUPPORT_XATTRS | ||
324 | --- a/rsync.1.md | ||
325 | +++ b/rsync.1.md | ||
326 | @@ -154,6 +154,33 @@ rsync daemon by leaving off the module n | ||
327 | |||
328 | See the following section for more details. | ||
329 | |||
330 | +## MULTI-HOST SECURITY | ||
331 | + | ||
332 | +Rsync takes steps to ensure that the file requests that are shared in a | ||
333 | +transfer are protected against various security issues. Most of the potential | ||
334 | +problems arise on the receiving side where rsync takes steps to ensure that the | ||
335 | +list of files being transferred remains within the bounds of what was | ||
336 | +requested. | ||
337 | + | ||
338 | +Toward this end, rsync 3.1.2 and later have aborted when a file list contains | ||
339 | +an absolute or relative path that tries to escape out of the top of the | ||
340 | +transfer. Also, beginning with version 3.2.5, rsync does two more safety | ||
341 | +checks of the file list to (1) ensure that no extra source arguments were added | ||
342 | +into the transfer other than those that the client requested and (2) ensure | ||
343 | +that the file list obeys the exclude rules that we sent to the sender. | ||
344 | + | ||
345 | +For those that don't yet have a 3.2.5 client rsync, it is safest to do a copy | ||
346 | +into a dedicated destination directory for the remote files rather than | ||
347 | +requesting the remote content get mixed in with other local content. For | ||
348 | +example, doing an rsync copy into your home directory is potentially unsafe on | ||
349 | +an older rsync if the remote rsync is being controlled by a bad actor: | ||
350 | + | ||
351 | +> rsync -aiv host1:dir1 ~ | ||
352 | + | ||
353 | +A safer command would be: | ||
354 | + | ||
355 | +> rsync -aiv host1:dir1 ~/host1-files | ||
356 | + | ||
357 | ## ADVANCED USAGE | ||
358 | |||
359 | The syntax for requesting multiple files from a remote host is done by | ||
360 | @@ -2323,6 +2350,12 @@ your home directory (remove the '=' for | ||
361 | behavior. The environment is always overridden by manually specified | ||
362 | positive or negative options (the negative is `--no-old-args`). | ||
363 | |||
364 | + Note that this option also disables the extra safety check added in 3.2.5 | ||
365 | + that ensures that a remote sender isn't including extra top-level items in | ||
366 | + the file-list that you didn't request. This side-effect is necessary | ||
367 | + because we can't know for sure what names to expect when the remote shell | ||
368 | + is interpreting the args. | ||
369 | + | ||
370 | This option conflicts with the [`--protect-args`](#opt) option. | ||
371 | |||
372 | 0. `--protect-args`, `-s` | ||
diff --git a/meta/recipes-devtools/rsync/rsync_3.2.4.bb b/meta/recipes-devtools/rsync/rsync_3.2.5.bb index 711e97002d..a1ba5ea44d 100644 --- a/meta/recipes-devtools/rsync/rsync_3.2.4.bb +++ b/meta/recipes-devtools/rsync/rsync_3.2.5.bb | |||
@@ -14,10 +14,8 @@ SRC_URI = "https://download.samba.org/pub/${BPN}/src/${BP}.tar.gz \ | |||
14 | file://rsyncd.conf \ | 14 | file://rsyncd.conf \ |
15 | file://makefile-no-rebuild.patch \ | 15 | file://makefile-no-rebuild.patch \ |
16 | file://determism.patch \ | 16 | file://determism.patch \ |
17 | file://CVE-2022-29154.patch \ | ||
18 | " | 17 | " |
19 | 18 | SRC_URI[sha256sum] = "2ac4d21635cdf791867bc377c35ca6dda7f50d919a58be45057fd51600c69aba" | |
20 | SRC_URI[sha256sum] = "6f761838d08052b0b6579cf7f6737d93e47f01f4da04c5d24d3447b7f2a5fad1" | ||
21 | 19 | ||
22 | # -16548 required for v3.1.3pre1. Already in v3.1.3. | 20 | # -16548 required for v3.1.3pre1. Already in v3.1.3. |
23 | CVE_CHECK_IGNORE += " CVE-2017-16548 " | 21 | CVE_CHECK_IGNORE += " CVE-2017-16548 " |