diff options
Diffstat (limited to 'meta/recipes-core/systemd/systemd/CVE-2023-26604-2.patch')
-rw-r--r-- | meta/recipes-core/systemd/systemd/CVE-2023-26604-2.patch | 264 |
1 files changed, 264 insertions, 0 deletions
diff --git a/meta/recipes-core/systemd/systemd/CVE-2023-26604-2.patch b/meta/recipes-core/systemd/systemd/CVE-2023-26604-2.patch new file mode 100644 index 0000000000..95da7cfad6 --- /dev/null +++ b/meta/recipes-core/systemd/systemd/CVE-2023-26604-2.patch | |||
@@ -0,0 +1,264 @@ | |||
1 | From 1b5b507cd2d1d7a2b053151abb548475ad9c5c3b Mon Sep 17 00:00:00 2001 | ||
2 | From: =?UTF-8?q?Zbigniew=20J=C4=99drzejewski-Szmek?= <zbyszek@in.waw.pl> | ||
3 | Date: Mon, 12 Oct 2020 18:57:32 +0200 | ||
4 | Subject: [PATCH] test-login: always test sd_pid_get_owner_uid(), modernize | ||
5 | |||
6 | A long time some function only worked when in a session, and the test | ||
7 | didn't execute them when sd_pid_get_session() failed. Let's always call | ||
8 | them to increase coverage. | ||
9 | |||
10 | While at it, let's test for ==0 not >=0 where we don't expect the function | ||
11 | to return anything except 0 or error. | ||
12 | |||
13 | CVE: CVE-2023-26604 | ||
14 | Upstream-Status: Backport [https://github.com/systemd/systemd/pull/17270/commits/1b5b507cd2d1d7a2b053151abb548475ad9c5c3b.patch] | ||
15 | Comments: Hunk not refreshed | ||
16 | Signed-off-by: rajmohan r <rajmohan.r@kpit.com> | ||
17 | --- | ||
18 | src/libsystemd/sd-login/test-login.c | 131 ++++++++++++++------------- | ||
19 | 1 file changed, 70 insertions(+), 61 deletions(-) | ||
20 | |||
21 | diff --git a/src/libsystemd/sd-login/test-login.c b/src/libsystemd/sd-login/test-login.c | ||
22 | index c0c77e04714b..0494fc77ba18 100644 | ||
23 | --- a/src/libsystemd/sd-login/test-login.c | ||
24 | +++ b/src/libsystemd/sd-login/test-login.c | ||
25 | @@ -5,21 +5,22 @@ | ||
26 | #include "sd-login.h" | ||
27 | |||
28 | #include "alloc-util.h" | ||
29 | +#include "errno-list.h" | ||
30 | #include "fd-util.h" | ||
31 | #include "format-util.h" | ||
32 | #include "log.h" | ||
33 | #include "string-util.h" | ||
34 | #include "strv.h" | ||
35 | #include "time-util.h" | ||
36 | -#include "util.h" | ||
37 | +#include "user-util.h" | ||
38 | |||
39 | static char* format_uids(char **buf, uid_t* uids, int count) { | ||
40 | - int pos = 0, k, inc; | ||
41 | + int pos = 0, inc; | ||
42 | size_t size = (DECIMAL_STR_MAX(uid_t) + 1) * count + 1; | ||
43 | |||
44 | assert_se(*buf = malloc(size)); | ||
45 | |||
46 | - for (k = 0; k < count; k++) { | ||
47 | + for (int k = 0; k < count; k++) { | ||
48 | sprintf(*buf + pos, "%s"UID_FMT"%n", k > 0 ? " " : "", uids[k], &inc); | ||
49 | pos += inc; | ||
50 | } | ||
51 | @@ -30,6 +31,10 @@ static char* format_uids(char **buf, uid_t* uids, int count) { | ||
52 | return *buf; | ||
53 | } | ||
54 | |||
55 | +static const char *e(int r) { | ||
56 | + return r == 0 ? "OK" : errno_to_name(r); | ||
57 | +} | ||
58 | + | ||
59 | static void test_login(void) { | ||
60 | _cleanup_close_pair_ int pair[2] = { -1, -1 }; | ||
61 | _cleanup_free_ char *pp = NULL, *qq = NULL, | ||
62 | @@ -39,65 +44,71 @@ static void test_login(void) { | ||
63 | *seat = NULL, *session = NULL, | ||
64 | *unit = NULL, *user_unit = NULL, *slice = NULL; | ||
65 | int r; | ||
66 | - uid_t u, u2; | ||
67 | - char *t, **seats, **sessions; | ||
68 | + uid_t u, u2 = UID_INVALID; | ||
69 | + char *t, **seats = NULL, **sessions = NULL; | ||
70 | |||
71 | r = sd_pid_get_unit(0, &unit); | ||
72 | - assert_se(r >= 0 || r == -ENODATA); | ||
73 | - log_info("sd_pid_get_unit(0, …) → \"%s\"", strna(unit)); | ||
74 | + log_info("sd_pid_get_unit(0, …) → %s / \"%s\"", e(r), strnull(unit)); | ||
75 | + assert_se(IN_SET(r, 0, -ENODATA)); | ||
76 | |||
77 | r = sd_pid_get_user_unit(0, &user_unit); | ||
78 | - assert_se(r >= 0 || r == -ENODATA); | ||
79 | - log_info("sd_pid_get_user_unit(0, …) → \"%s\"", strna(user_unit)); | ||
80 | + log_info("sd_pid_get_user_unit(0, …) → %s / \"%s\"", e(r), strnull(user_unit)); | ||
81 | + assert_se(IN_SET(r, 0, -ENODATA)); | ||
82 | |||
83 | r = sd_pid_get_slice(0, &slice); | ||
84 | - assert_se(r >= 0 || r == -ENODATA); | ||
85 | - log_info("sd_pid_get_slice(0, …) → \"%s\"", strna(slice)); | ||
86 | + log_info("sd_pid_get_slice(0, …) → %s / \"%s\"", e(r), strnull(slice)); | ||
87 | + assert_se(IN_SET(r, 0, -ENODATA)); | ||
88 | + | ||
89 | + r = sd_pid_get_owner_uid(0, &u2); | ||
90 | + log_info("sd_pid_get_owner_uid(0, …) → %s / "UID_FMT, e(r), u2); | ||
91 | + assert_se(IN_SET(r, 0, -ENODATA)); | ||
92 | |||
93 | r = sd_pid_get_session(0, &session); | ||
94 | - if (r < 0) { | ||
95 | - log_warning_errno(r, "sd_pid_get_session(0, …): %m"); | ||
96 | - if (r == -ENODATA) | ||
97 | - log_info("Seems we are not running in a session, skipping some tests."); | ||
98 | - } else { | ||
99 | - log_info("sd_pid_get_session(0, …) → \"%s\"", session); | ||
100 | - | ||
101 | - assert_se(sd_pid_get_owner_uid(0, &u2) == 0); | ||
102 | - log_info("sd_pid_get_owner_uid(0, …) → "UID_FMT, u2); | ||
103 | - | ||
104 | - assert_se(sd_pid_get_cgroup(0, &cgroup) == 0); | ||
105 | - log_info("sd_pid_get_cgroup(0, …) → \"%s\"", cgroup); | ||
106 | - | ||
107 | - r = sd_uid_get_display(u2, &display_session); | ||
108 | - assert_se(r >= 0 || r == -ENODATA); | ||
109 | - log_info("sd_uid_get_display("UID_FMT", …) → \"%s\"", | ||
110 | - u2, strnull(display_session)); | ||
111 | - | ||
112 | - assert_se(socketpair(AF_UNIX, SOCK_STREAM, 0, pair) == 0); | ||
113 | - sd_peer_get_session(pair[0], &pp); | ||
114 | - sd_peer_get_session(pair[1], &qq); | ||
115 | - assert_se(streq_ptr(pp, qq)); | ||
116 | - | ||
117 | - r = sd_uid_get_sessions(u2, false, &sessions); | ||
118 | + log_info("sd_pid_get_session(0, …) → %s / \"%s\"", e(r), strnull(session)); | ||
119 | + | ||
120 | + r = sd_pid_get_cgroup(0, &cgroup); | ||
121 | + log_info("sd_pid_get_cgroup(0, …) → %s / \"%s\"", e(r), strnull(cgroup)); | ||
122 | + assert_se(r == 0); | ||
123 | + | ||
124 | + r = sd_uid_get_display(u2, &display_session); | ||
125 | + log_info("sd_uid_get_display("UID_FMT", …) → %s / \"%s\"", u2, e(r), strnull(display_session)); | ||
126 | + if (u2 == UID_INVALID) | ||
127 | + assert_se(r == -EINVAL); | ||
128 | + else | ||
129 | + assert_se(IN_SET(r, 0, -ENODATA)); | ||
130 | + | ||
131 | + assert_se(socketpair(AF_UNIX, SOCK_STREAM, 0, pair) == 0); | ||
132 | + sd_peer_get_session(pair[0], &pp); | ||
133 | + sd_peer_get_session(pair[1], &qq); | ||
134 | + assert_se(streq_ptr(pp, qq)); | ||
135 | + | ||
136 | + r = sd_uid_get_sessions(u2, false, &sessions); | ||
137 | + assert_se(t = strv_join(sessions, " ")); | ||
138 | + log_info("sd_uid_get_sessions("UID_FMT", …) → %s \"%s\"", u2, e(r), t); | ||
139 | + if (u2 == UID_INVALID) | ||
140 | + assert_se(r == -EINVAL); | ||
141 | + else { | ||
142 | assert_se(r >= 0); | ||
143 | assert_se(r == (int) strv_length(sessions)); | ||
144 | - assert_se(t = strv_join(sessions, " ")); | ||
145 | - strv_free(sessions); | ||
146 | - log_info("sd_uid_get_sessions("UID_FMT", …) → [%i] \"%s\"", u2, r, t); | ||
147 | - free(t); | ||
148 | + } | ||
149 | + sessions = strv_free(sessions); | ||
150 | + free(t); | ||
151 | |||
152 | - assert_se(r == sd_uid_get_sessions(u2, false, NULL)); | ||
153 | + assert_se(r == sd_uid_get_sessions(u2, false, NULL)); | ||
154 | |||
155 | - r = sd_uid_get_seats(u2, false, &seats); | ||
156 | + r = sd_uid_get_seats(u2, false, &seats); | ||
157 | + assert_se(t = strv_join(seats, " ")); | ||
158 | + log_info("sd_uid_get_seats("UID_FMT", …) → %s \"%s\"", u2, e(r), t); | ||
159 | + if (u2 == UID_INVALID) | ||
160 | + assert_se(r == -EINVAL); | ||
161 | + else { | ||
162 | assert_se(r >= 0); | ||
163 | assert_se(r == (int) strv_length(seats)); | ||
164 | - assert_se(t = strv_join(seats, " ")); | ||
165 | - strv_free(seats); | ||
166 | - log_info("sd_uid_get_seats("UID_FMT", …) → [%i] \"%s\"", u2, r, t); | ||
167 | - free(t); | ||
168 | - | ||
169 | - assert_se(r == sd_uid_get_seats(u2, false, NULL)); | ||
170 | } | ||
171 | + seats = strv_free(seats); | ||
172 | + free(t); | ||
173 | + | ||
174 | + assert_se(r == sd_uid_get_seats(u2, false, NULL)); | ||
175 | |||
176 | if (session) { | ||
177 | r = sd_session_is_active(session); | ||
178 | @@ -109,7 +120,7 @@ static void test_login(void) { | ||
179 | log_info("sd_session_is_remote(\"%s\") → %s", session, yes_no(r)); | ||
180 | |||
181 | r = sd_session_get_state(session, &state); | ||
182 | - assert_se(r >= 0); | ||
183 | + assert_se(r == 0); | ||
184 | log_info("sd_session_get_state(\"%s\") → \"%s\"", session, state); | ||
185 | |||
186 | assert_se(sd_session_get_uid(session, &u) >= 0); | ||
187 | @@ -123,16 +134,16 @@ static void test_login(void) { | ||
188 | log_info("sd_session_get_class(\"%s\") → \"%s\"", session, class); | ||
189 | |||
190 | r = sd_session_get_display(session, &display); | ||
191 | - assert_se(r >= 0 || r == -ENODATA); | ||
192 | + assert_se(IN_SET(r, 0, -ENODATA)); | ||
193 | log_info("sd_session_get_display(\"%s\") → \"%s\"", session, strna(display)); | ||
194 | |||
195 | r = sd_session_get_remote_user(session, &remote_user); | ||
196 | - assert_se(r >= 0 || r == -ENODATA); | ||
197 | + assert_se(IN_SET(r, 0, -ENODATA)); | ||
198 | log_info("sd_session_get_remote_user(\"%s\") → \"%s\"", | ||
199 | session, strna(remote_user)); | ||
200 | |||
201 | r = sd_session_get_remote_host(session, &remote_host); | ||
202 | - assert_se(r >= 0 || r == -ENODATA); | ||
203 | + assert_se(IN_SET(r, 0, -ENODATA)); | ||
204 | log_info("sd_session_get_remote_host(\"%s\") → \"%s\"", | ||
205 | session, strna(remote_host)); | ||
206 | |||
207 | @@ -161,7 +172,7 @@ static void test_login(void) { | ||
208 | assert_se(r == -ENODATA); | ||
209 | } | ||
210 | |||
211 | - assert_se(sd_uid_get_state(u, &state2) >= 0); | ||
212 | + assert_se(sd_uid_get_state(u, &state2) == 0); | ||
213 | log_info("sd_uid_get_state("UID_FMT", …) → %s", u, state2); | ||
214 | } | ||
215 | |||
216 | @@ -173,11 +184,11 @@ static void test_login(void) { | ||
217 | assert_se(sd_uid_is_on_seat(u, 0, seat) > 0); | ||
218 | |||
219 | r = sd_seat_get_active(seat, &session2, &u2); | ||
220 | - assert_se(r >= 0); | ||
221 | + assert_se(r == 0); | ||
222 | log_info("sd_seat_get_active(\"%s\", …) → \"%s\", "UID_FMT, seat, session2, u2); | ||
223 | |||
224 | r = sd_uid_is_on_seat(u, 1, seat); | ||
225 | - assert_se(r >= 0); | ||
226 | + assert_se(IN_SET(r, 0, 1)); | ||
227 | assert_se(!!r == streq(session, session2)); | ||
228 | |||
229 | r = sd_seat_get_sessions(seat, &sessions, &uids, &n); | ||
230 | @@ -185,8 +196,8 @@ static void test_login(void) { | ||
231 | assert_se(r == (int) strv_length(sessions)); | ||
232 | assert_se(t = strv_join(sessions, " ")); | ||
233 | strv_free(sessions); | ||
234 | - log_info("sd_seat_get_sessions(\"%s\", …) → %i, \"%s\", [%i] {%s}", | ||
235 | - seat, r, t, n, format_uids(&buf, uids, n)); | ||
236 | + log_info("sd_seat_get_sessions(\"%s\", …) → %s, \"%s\", [%u] {%s}", | ||
237 | + seat, e(r), t, n, format_uids(&buf, uids, n)); | ||
238 | free(t); | ||
239 | |||
240 | assert_se(sd_seat_get_sessions(seat, NULL, NULL, NULL) == r); | ||
241 | @@ -204,7 +215,7 @@ static void test_login(void) { | ||
242 | |||
243 | r = sd_seat_get_active(NULL, &t, NULL); | ||
244 | assert_se(IN_SET(r, 0, -ENODATA)); | ||
245 | - log_info("sd_seat_get_active(NULL, …) (active session on current seat) → %s", strnull(t)); | ||
246 | + log_info("sd_seat_get_active(NULL, …) (active session on current seat) → %s / \"%s\"", e(r), strnull(t)); | ||
247 | free(t); | ||
248 | |||
249 | r = sd_get_sessions(&sessions); | ||
250 | @@ -244,13 +255,11 @@ static void test_login(void) { | ||
251 | |||
252 | static void test_monitor(void) { | ||
253 | sd_login_monitor *m = NULL; | ||
254 | - unsigned n; | ||
255 | int r; | ||
256 | |||
257 | - r = sd_login_monitor_new("session", &m); | ||
258 | - assert_se(r >= 0); | ||
259 | + assert_se(sd_login_monitor_new("session", &m) == 0); | ||
260 | |||
261 | - for (n = 0; n < 5; n++) { | ||
262 | + for (unsigned n = 0; n < 5; n++) { | ||
263 | struct pollfd pollfd = {}; | ||
264 | usec_t timeout, nw; | ||