diff options
author | rajmohan r <rajmohan.r@kpit.com> | 2023-04-19 16:04:55 +0530 |
---|---|---|
committer | Steve Sakoman <steve@sakoman.com> | 2023-04-26 04:19:06 -1000 |
commit | afb4425be96e8e5a47a5dd3b87d5615bd3d8e0eb (patch) | |
tree | 3a8ede591cc89997ae6a28995323fc5ff938c53f | |
parent | 20c932eb013ebf83ef435a29edd8d10f577aaf4b (diff) | |
download | poky-afb4425be96e8e5a47a5dd3b87d5615bd3d8e0eb.tar.gz |
systemd: Fix CVE-2023-26604
Below patch files to fix CVE-2023-26604
CVE-2023-26604-1.patch, CVE-2023-26604-2.patch and
CVE-2023-26604-3.patch and CVE-2023-26604-4.patch
make pager secure when under euid is changed or explicitly
requested
Reference:
CVE-2023-26604-1.patch:
https://github.com/systemd/systemd/pull/17270/commits/612ebf6c913dd0e4197c44909cb3157f5c51a2f0
CVE-2023-26604-2.patch:
https://github.com/systemd/systemd/pull/17270/commits/1b5b507cd2d1d7a2b053151abb548475ad9c5c3b
CVE-2023-26604-3.patch:
https://github.com/systemd/systemd/pull/17270/commits/0a42426d797406b4b01a0d9c13bb759c2629d108
CVE-2023-26604-4.patch:
https://github.com/systemd/systemd/pull/17359/commits/b8f736b30e20a2b44e7c34bb4e43b0d97ae77e3c
(From OE-Core rev: 7880eb801dcee44a9e8920d249057492d1de6b12)
Signed-off-by: rajmohan r <rajmohan.r@kpit.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
5 files changed, 597 insertions, 0 deletions
diff --git a/meta/recipes-core/systemd/systemd/CVE-2023-26604-1.patch b/meta/recipes-core/systemd/systemd/CVE-2023-26604-1.patch new file mode 100644 index 0000000000..39f9480cf8 --- /dev/null +++ b/meta/recipes-core/systemd/systemd/CVE-2023-26604-1.patch | |||
@@ -0,0 +1,115 @@ | |||
1 | From 612ebf6c913dd0e4197c44909cb3157f5c51a2f0 Mon Sep 17 00:00:00 2001 | ||
2 | From: Lennart Poettering <lennart@poettering.net> | ||
3 | Date: Mon, 31 Aug 2020 19:37:13 +0200 | ||
4 | Subject: [PATCH] pager: set $LESSSECURE whenver we invoke a pager | ||
5 | |||
6 | Some extra safety when invoked via "sudo". With this we address a | ||
7 | genuine design flaw of sudo, and we shouldn't need to deal with this. | ||
8 | But it's still a good idea to disable this surface given how exotic it | ||
9 | is. | ||
10 | |||
11 | Prompted by #5666 | ||
12 | |||
13 | CVE: CVE-2023-26604 | ||
14 | Upstream-Status: Backport [https://github.com/systemd/systemd/pull/17270/commits/612ebf6c913dd0e4197c44909cb3157f5c51a2f0] | ||
15 | Comments: Hunk not refreshed | ||
16 | Signed-off-by: rajmohan r <rajmohan.r@kpit.com> | ||
17 | --- | ||
18 | man/less-variables.xml | 9 +++++++++ | ||
19 | man/systemctl.xml | 1 + | ||
20 | man/systemd.xml | 1 + | ||
21 | src/shared/pager.c | 23 +++++++++++++++++++++-- | ||
22 | 4 files changed, 32 insertions(+), 2 deletions(-) | ||
23 | |||
24 | diff --git a/man/less-variables.xml b/man/less-variables.xml | ||
25 | index 08e513c99f8e..c52511ca8e18 100644 | ||
26 | --- a/man/less-variables.xml | ||
27 | +++ b/man/less-variables.xml | ||
28 | @@ -64,6 +64,15 @@ | ||
29 | the invoking terminal is determined to be UTF-8 compatible).</para></listitem> | ||
30 | </varlistentry> | ||
31 | |||
32 | + <varlistentry id='lesssecure'> | ||
33 | + <term><varname>$SYSTEMD_LESSSECURE</varname></term> | ||
34 | + | ||
35 | + <listitem><para>Takes a boolean argument. Overrides the <varname>$LESSSECURE</varname> environment | ||
36 | + variable when invoking the pager, which controls the "secure" mode of less (which disables commands | ||
37 | + such as <literal>|</literal> which allow to easily shell out to external command lines). By default | ||
38 | + less secure mode is enabled, with this setting it may be disabled.</para></listitem> | ||
39 | + </varlistentry> | ||
40 | + | ||
41 | <varlistentry id='colors'> | ||
42 | <term><varname>$SYSTEMD_COLORS</varname></term> | ||
43 | |||
44 | diff --git a/man/systemctl.xml b/man/systemctl.xml | ||
45 | index 1c5502883700..a3f0c3041a57 100644 | ||
46 | --- a/man/systemctl.xml | ||
47 | +++ b/man/systemctl.xml | ||
48 | @@ -2240,6 +2240,7 @@ Jan 12 10:46:45 example.com bluetoothd[8900]: gatt-time-server: Input/output err | ||
49 | <xi:include href="less-variables.xml" xpointer="pager"/> | ||
50 | <xi:include href="less-variables.xml" xpointer="less"/> | ||
51 | <xi:include href="less-variables.xml" xpointer="lesscharset"/> | ||
52 | + <xi:include href="less-variables.xml" xpointer="lesssecure"/> | ||
53 | <xi:include href="less-variables.xml" xpointer="colors"/> | ||
54 | <xi:include href="less-variables.xml" xpointer="urlify"/> | ||
55 | </refsect1> | ||
56 | diff --git a/man/systemd.xml b/man/systemd.xml | ||
57 | index a9040545c2ab..c92cfef77689 100644 | ||
58 | --- a/man/systemd.xml | ||
59 | +++ b/man/systemd.xml | ||
60 | @@ -692,6 +692,7 @@ | ||
61 | <xi:include href="less-variables.xml" xpointer="pager"/> | ||
62 | <xi:include href="less-variables.xml" xpointer="less"/> | ||
63 | <xi:include href="less-variables.xml" xpointer="lesscharset"/> | ||
64 | + <xi:include href="less-variables.xml" xpointer="lesssecure"/> | ||
65 | <xi:include href="less-variables.xml" xpointer="colors"/> | ||
66 | <xi:include href="less-variables.xml" xpointer="urlify"/> | ||
67 | |||
68 | diff --git a/src/shared/pager.c b/src/shared/pager.c | ||
69 | index e03be6d23b2d..9c21881241f5 100644 | ||
70 | --- a/src/shared/pager.c | ||
71 | +++ b/src/shared/pager.c | ||
72 | @@ -9,6 +9,7 @@ | ||
73 | #include <unistd.h> | ||
74 | |||
75 | #include "copy.h" | ||
76 | +#include "env-util.h" | ||
77 | #include "fd-util.h" | ||
78 | #include "fileio.h" | ||
79 | #include "io-util.h" | ||
80 | @@ -152,8 +153,7 @@ int pager_open(PagerFlags flags) { | ||
81 | _exit(EXIT_FAILURE); | ||
82 | } | ||
83 | |||
84 | - /* Initialize a good charset for less. This is | ||
85 | - * particularly important if we output UTF-8 | ||
86 | + /* Initialize a good charset for less. This is particularly important if we output UTF-8 | ||
87 | * characters. */ | ||
88 | less_charset = getenv("SYSTEMD_LESSCHARSET"); | ||
89 | if (!less_charset && is_locale_utf8()) | ||
90 | @@ -164,6 +164,25 @@ int pager_open(PagerFlags flags) { | ||
91 | _exit(EXIT_FAILURE); | ||
92 | } | ||
93 | |||
94 | + /* People might invoke us from sudo, don't needlessly allow less to be a way to shell out | ||
95 | + * privileged stuff. */ | ||
96 | + r = getenv_bool("SYSTEMD_LESSSECURE"); | ||
97 | + if (r == 0) { /* Remove env var if off */ | ||
98 | + if (unsetenv("LESSSECURE") < 0) { | ||
99 | + log_error_errno(errno, "Failed to uset environment variable LESSSECURE: %m"); | ||
100 | + _exit(EXIT_FAILURE); | ||
101 | + } | ||
102 | + } else { | ||
103 | + /* Set env var otherwise */ | ||
104 | + if (r < 0) | ||
105 | + log_warning_errno(r, "Unable to parse $SYSTEMD_LESSSECURE, ignoring: %m"); | ||
106 | + | ||
107 | + if (setenv("LESSSECURE", "1", 1) < 0) { | ||
108 | + log_error_errno(errno, "Failed to set environment variable LESSSECURE: %m"); | ||
109 | + _exit(EXIT_FAILURE); | ||
110 | + } | ||
111 | + } | ||
112 | + | ||
113 | if (pager_args) { | ||
114 | r = loop_write(exe_name_pipe[1], pager_args[0], strlen(pager_args[0]) + 1, false); | ||
115 | if (r < 0) { | ||
diff --git a/meta/recipes-core/systemd/systemd/CVE-2023-26604-2.patch b/meta/recipes-core/systemd/systemd/CVE-2023-26604-2.patch new file mode 100644 index 0000000000..95da7cfad6 --- /dev/null +++ b/meta/recipes-core/systemd/systemd/CVE-2023-26604-2.patch | |||
@@ -0,0 +1,264 @@ | |||
1 | From 1b5b507cd2d1d7a2b053151abb548475ad9c5c3b Mon Sep 17 00:00:00 2001 | ||
2 | From: =?UTF-8?q?Zbigniew=20J=C4=99drzejewski-Szmek?= <zbyszek@in.waw.pl> | ||
3 | Date: Mon, 12 Oct 2020 18:57:32 +0200 | ||
4 | Subject: [PATCH] test-login: always test sd_pid_get_owner_uid(), modernize | ||
5 | |||
6 | A long time some function only worked when in a session, and the test | ||
7 | didn't execute them when sd_pid_get_session() failed. Let's always call | ||
8 | them to increase coverage. | ||
9 | |||
10 | While at it, let's test for ==0 not >=0 where we don't expect the function | ||
11 | to return anything except 0 or error. | ||
12 | |||
13 | CVE: CVE-2023-26604 | ||
14 | Upstream-Status: Backport [https://github.com/systemd/systemd/pull/17270/commits/1b5b507cd2d1d7a2b053151abb548475ad9c5c3b.patch] | ||
15 | Comments: Hunk not refreshed | ||
16 | Signed-off-by: rajmohan r <rajmohan.r@kpit.com> | ||
17 | --- | ||
18 | src/libsystemd/sd-login/test-login.c | 131 ++++++++++++++------------- | ||
19 | 1 file changed, 70 insertions(+), 61 deletions(-) | ||
20 | |||
21 | diff --git a/src/libsystemd/sd-login/test-login.c b/src/libsystemd/sd-login/test-login.c | ||
22 | index c0c77e04714b..0494fc77ba18 100644 | ||
23 | --- a/src/libsystemd/sd-login/test-login.c | ||
24 | +++ b/src/libsystemd/sd-login/test-login.c | ||
25 | @@ -5,21 +5,22 @@ | ||
26 | #include "sd-login.h" | ||
27 | |||
28 | #include "alloc-util.h" | ||
29 | +#include "errno-list.h" | ||
30 | #include "fd-util.h" | ||
31 | #include "format-util.h" | ||
32 | #include "log.h" | ||
33 | #include "string-util.h" | ||
34 | #include "strv.h" | ||
35 | #include "time-util.h" | ||
36 | -#include "util.h" | ||
37 | +#include "user-util.h" | ||
38 | |||
39 | static char* format_uids(char **buf, uid_t* uids, int count) { | ||
40 | - int pos = 0, k, inc; | ||
41 | + int pos = 0, inc; | ||
42 | size_t size = (DECIMAL_STR_MAX(uid_t) + 1) * count + 1; | ||
43 | |||
44 | assert_se(*buf = malloc(size)); | ||
45 | |||
46 | - for (k = 0; k < count; k++) { | ||
47 | + for (int k = 0; k < count; k++) { | ||
48 | sprintf(*buf + pos, "%s"UID_FMT"%n", k > 0 ? " " : "", uids[k], &inc); | ||
49 | pos += inc; | ||
50 | } | ||
51 | @@ -30,6 +31,10 @@ static char* format_uids(char **buf, uid_t* uids, int count) { | ||
52 | return *buf; | ||
53 | } | ||
54 | |||
55 | +static const char *e(int r) { | ||
56 | + return r == 0 ? "OK" : errno_to_name(r); | ||
57 | +} | ||
58 | + | ||
59 | static void test_login(void) { | ||
60 | _cleanup_close_pair_ int pair[2] = { -1, -1 }; | ||
61 | _cleanup_free_ char *pp = NULL, *qq = NULL, | ||
62 | @@ -39,65 +44,71 @@ static void test_login(void) { | ||
63 | *seat = NULL, *session = NULL, | ||
64 | *unit = NULL, *user_unit = NULL, *slice = NULL; | ||
65 | int r; | ||
66 | - uid_t u, u2; | ||
67 | - char *t, **seats, **sessions; | ||
68 | + uid_t u, u2 = UID_INVALID; | ||
69 | + char *t, **seats = NULL, **sessions = NULL; | ||
70 | |||
71 | r = sd_pid_get_unit(0, &unit); | ||
72 | - assert_se(r >= 0 || r == -ENODATA); | ||
73 | - log_info("sd_pid_get_unit(0, …) → \"%s\"", strna(unit)); | ||
74 | + log_info("sd_pid_get_unit(0, …) → %s / \"%s\"", e(r), strnull(unit)); | ||
75 | + assert_se(IN_SET(r, 0, -ENODATA)); | ||
76 | |||
77 | r = sd_pid_get_user_unit(0, &user_unit); | ||
78 | - assert_se(r >= 0 || r == -ENODATA); | ||
79 | - log_info("sd_pid_get_user_unit(0, …) → \"%s\"", strna(user_unit)); | ||
80 | + log_info("sd_pid_get_user_unit(0, …) → %s / \"%s\"", e(r), strnull(user_unit)); | ||
81 | + assert_se(IN_SET(r, 0, -ENODATA)); | ||
82 | |||
83 | r = sd_pid_get_slice(0, &slice); | ||
84 | - assert_se(r >= 0 || r == -ENODATA); | ||
85 | - log_info("sd_pid_get_slice(0, …) → \"%s\"", strna(slice)); | ||
86 | + log_info("sd_pid_get_slice(0, …) → %s / \"%s\"", e(r), strnull(slice)); | ||
87 | + assert_se(IN_SET(r, 0, -ENODATA)); | ||
88 | + | ||
89 | + r = sd_pid_get_owner_uid(0, &u2); | ||
90 | + log_info("sd_pid_get_owner_uid(0, …) → %s / "UID_FMT, e(r), u2); | ||
91 | + assert_se(IN_SET(r, 0, -ENODATA)); | ||
92 | |||
93 | r = sd_pid_get_session(0, &session); | ||
94 | - if (r < 0) { | ||
95 | - log_warning_errno(r, "sd_pid_get_session(0, …): %m"); | ||
96 | - if (r == -ENODATA) | ||
97 | - log_info("Seems we are not running in a session, skipping some tests."); | ||
98 | - } else { | ||
99 | - log_info("sd_pid_get_session(0, …) → \"%s\"", session); | ||
100 | - | ||
101 | - assert_se(sd_pid_get_owner_uid(0, &u2) == 0); | ||
102 | - log_info("sd_pid_get_owner_uid(0, …) → "UID_FMT, u2); | ||
103 | - | ||
104 | - assert_se(sd_pid_get_cgroup(0, &cgroup) == 0); | ||
105 | - log_info("sd_pid_get_cgroup(0, …) → \"%s\"", cgroup); | ||
106 | - | ||
107 | - r = sd_uid_get_display(u2, &display_session); | ||
108 | - assert_se(r >= 0 || r == -ENODATA); | ||
109 | - log_info("sd_uid_get_display("UID_FMT", …) → \"%s\"", | ||
110 | - u2, strnull(display_session)); | ||
111 | - | ||
112 | - assert_se(socketpair(AF_UNIX, SOCK_STREAM, 0, pair) == 0); | ||
113 | - sd_peer_get_session(pair[0], &pp); | ||
114 | - sd_peer_get_session(pair[1], &qq); | ||
115 | - assert_se(streq_ptr(pp, qq)); | ||
116 | - | ||
117 | - r = sd_uid_get_sessions(u2, false, &sessions); | ||
118 | + log_info("sd_pid_get_session(0, …) → %s / \"%s\"", e(r), strnull(session)); | ||
119 | + | ||
120 | + r = sd_pid_get_cgroup(0, &cgroup); | ||
121 | + log_info("sd_pid_get_cgroup(0, …) → %s / \"%s\"", e(r), strnull(cgroup)); | ||
122 | + assert_se(r == 0); | ||
123 | + | ||
124 | + r = sd_uid_get_display(u2, &display_session); | ||
125 | + log_info("sd_uid_get_display("UID_FMT", …) → %s / \"%s\"", u2, e(r), strnull(display_session)); | ||
126 | + if (u2 == UID_INVALID) | ||
127 | + assert_se(r == -EINVAL); | ||
128 | + else | ||
129 | + assert_se(IN_SET(r, 0, -ENODATA)); | ||
130 | + | ||
131 | + assert_se(socketpair(AF_UNIX, SOCK_STREAM, 0, pair) == 0); | ||
132 | + sd_peer_get_session(pair[0], &pp); | ||
133 | + sd_peer_get_session(pair[1], &qq); | ||
134 | + assert_se(streq_ptr(pp, qq)); | ||
135 | + | ||
136 | + r = sd_uid_get_sessions(u2, false, &sessions); | ||
137 | + assert_se(t = strv_join(sessions, " ")); | ||
138 | + log_info("sd_uid_get_sessions("UID_FMT", …) → %s \"%s\"", u2, e(r), t); | ||
139 | + if (u2 == UID_INVALID) | ||
140 | + assert_se(r == -EINVAL); | ||
141 | + else { | ||
142 | assert_se(r >= 0); | ||
143 | assert_se(r == (int) strv_length(sessions)); | ||
144 | - assert_se(t = strv_join(sessions, " ")); | ||
145 | - strv_free(sessions); | ||
146 | - log_info("sd_uid_get_sessions("UID_FMT", …) → [%i] \"%s\"", u2, r, t); | ||
147 | - free(t); | ||
148 | + } | ||
149 | + sessions = strv_free(sessions); | ||
150 | + free(t); | ||
151 | |||
152 | - assert_se(r == sd_uid_get_sessions(u2, false, NULL)); | ||
153 | + assert_se(r == sd_uid_get_sessions(u2, false, NULL)); | ||
154 | |||
155 | - r = sd_uid_get_seats(u2, false, &seats); | ||
156 | + r = sd_uid_get_seats(u2, false, &seats); | ||
157 | + assert_se(t = strv_join(seats, " ")); | ||
158 | + log_info("sd_uid_get_seats("UID_FMT", …) → %s \"%s\"", u2, e(r), t); | ||
159 | + if (u2 == UID_INVALID) | ||
160 | + assert_se(r == -EINVAL); | ||
161 | + else { | ||
162 | assert_se(r >= 0); | ||
163 | assert_se(r == (int) strv_length(seats)); | ||
164 | - assert_se(t = strv_join(seats, " ")); | ||
165 | - strv_free(seats); | ||
166 | - log_info("sd_uid_get_seats("UID_FMT", …) → [%i] \"%s\"", u2, r, t); | ||
167 | - free(t); | ||
168 | - | ||
169 | - assert_se(r == sd_uid_get_seats(u2, false, NULL)); | ||
170 | } | ||
171 | + seats = strv_free(seats); | ||
172 | + free(t); | ||
173 | + | ||
174 | + assert_se(r == sd_uid_get_seats(u2, false, NULL)); | ||
175 | |||
176 | if (session) { | ||
177 | r = sd_session_is_active(session); | ||
178 | @@ -109,7 +120,7 @@ static void test_login(void) { | ||
179 | log_info("sd_session_is_remote(\"%s\") → %s", session, yes_no(r)); | ||
180 | |||
181 | r = sd_session_get_state(session, &state); | ||
182 | - assert_se(r >= 0); | ||
183 | + assert_se(r == 0); | ||
184 | log_info("sd_session_get_state(\"%s\") → \"%s\"", session, state); | ||
185 | |||
186 | assert_se(sd_session_get_uid(session, &u) >= 0); | ||
187 | @@ -123,16 +134,16 @@ static void test_login(void) { | ||
188 | log_info("sd_session_get_class(\"%s\") → \"%s\"", session, class); | ||
189 | |||
190 | r = sd_session_get_display(session, &display); | ||
191 | - assert_se(r >= 0 || r == -ENODATA); | ||
192 | + assert_se(IN_SET(r, 0, -ENODATA)); | ||
193 | log_info("sd_session_get_display(\"%s\") → \"%s\"", session, strna(display)); | ||
194 | |||
195 | r = sd_session_get_remote_user(session, &remote_user); | ||
196 | - assert_se(r >= 0 || r == -ENODATA); | ||
197 | + assert_se(IN_SET(r, 0, -ENODATA)); | ||
198 | log_info("sd_session_get_remote_user(\"%s\") → \"%s\"", | ||
199 | session, strna(remote_user)); | ||
200 | |||
201 | r = sd_session_get_remote_host(session, &remote_host); | ||
202 | - assert_se(r >= 0 || r == -ENODATA); | ||
203 | + assert_se(IN_SET(r, 0, -ENODATA)); | ||
204 | log_info("sd_session_get_remote_host(\"%s\") → \"%s\"", | ||
205 | session, strna(remote_host)); | ||
206 | |||
207 | @@ -161,7 +172,7 @@ static void test_login(void) { | ||
208 | assert_se(r == -ENODATA); | ||
209 | } | ||
210 | |||
211 | - assert_se(sd_uid_get_state(u, &state2) >= 0); | ||
212 | + assert_se(sd_uid_get_state(u, &state2) == 0); | ||
213 | log_info("sd_uid_get_state("UID_FMT", …) → %s", u, state2); | ||
214 | } | ||
215 | |||
216 | @@ -173,11 +184,11 @@ static void test_login(void) { | ||
217 | assert_se(sd_uid_is_on_seat(u, 0, seat) > 0); | ||
218 | |||
219 | r = sd_seat_get_active(seat, &session2, &u2); | ||
220 | - assert_se(r >= 0); | ||
221 | + assert_se(r == 0); | ||
222 | log_info("sd_seat_get_active(\"%s\", …) → \"%s\", "UID_FMT, seat, session2, u2); | ||
223 | |||
224 | r = sd_uid_is_on_seat(u, 1, seat); | ||
225 | - assert_se(r >= 0); | ||
226 | + assert_se(IN_SET(r, 0, 1)); | ||
227 | assert_se(!!r == streq(session, session2)); | ||
228 | |||
229 | r = sd_seat_get_sessions(seat, &sessions, &uids, &n); | ||
230 | @@ -185,8 +196,8 @@ static void test_login(void) { | ||
231 | assert_se(r == (int) strv_length(sessions)); | ||
232 | assert_se(t = strv_join(sessions, " ")); | ||
233 | strv_free(sessions); | ||
234 | - log_info("sd_seat_get_sessions(\"%s\", …) → %i, \"%s\", [%i] {%s}", | ||
235 | - seat, r, t, n, format_uids(&buf, uids, n)); | ||
236 | + log_info("sd_seat_get_sessions(\"%s\", …) → %s, \"%s\", [%u] {%s}", | ||
237 | + seat, e(r), t, n, format_uids(&buf, uids, n)); | ||
238 | free(t); | ||
239 | |||
240 | assert_se(sd_seat_get_sessions(seat, NULL, NULL, NULL) == r); | ||
241 | @@ -204,7 +215,7 @@ static void test_login(void) { | ||
242 | |||
243 | r = sd_seat_get_active(NULL, &t, NULL); | ||
244 | assert_se(IN_SET(r, 0, -ENODATA)); | ||
245 | - log_info("sd_seat_get_active(NULL, …) (active session on current seat) → %s", strnull(t)); | ||
246 | + log_info("sd_seat_get_active(NULL, …) (active session on current seat) → %s / \"%s\"", e(r), strnull(t)); | ||
247 | free(t); | ||
248 | |||
249 | r = sd_get_sessions(&sessions); | ||
250 | @@ -244,13 +255,11 @@ static void test_login(void) { | ||
251 | |||
252 | static void test_monitor(void) { | ||
253 | sd_login_monitor *m = NULL; | ||
254 | - unsigned n; | ||
255 | int r; | ||
256 | |||
257 | - r = sd_login_monitor_new("session", &m); | ||
258 | - assert_se(r >= 0); | ||
259 | + assert_se(sd_login_monitor_new("session", &m) == 0); | ||
260 | |||
261 | - for (n = 0; n < 5; n++) { | ||
262 | + for (unsigned n = 0; n < 5; n++) { | ||
263 | struct pollfd pollfd = {}; | ||
264 | usec_t timeout, nw; | ||
diff --git a/meta/recipes-core/systemd/systemd/CVE-2023-26604-3.patch b/meta/recipes-core/systemd/systemd/CVE-2023-26604-3.patch new file mode 100644 index 0000000000..f02f62b772 --- /dev/null +++ b/meta/recipes-core/systemd/systemd/CVE-2023-26604-3.patch | |||
@@ -0,0 +1,182 @@ | |||
1 | From 0a42426d797406b4b01a0d9c13bb759c2629d108 Mon Sep 17 00:00:00 2001 | ||
2 | From: =?UTF-8?q?Zbigniew=20J=C4=99drzejewski-Szmek?= <zbyszek@in.waw.pl> | ||
3 | Date: Wed, 7 Oct 2020 11:15:05 +0200 | ||
4 | Subject: [PATCH] pager: make pager secure when under euid is changed or | ||
5 | explicitly requested | ||
6 | |||
7 | The variable is renamed to SYSTEMD_PAGERSECURE (because it's not just about | ||
8 | less now), and we automatically enable secure mode in certain cases, but not | ||
9 | otherwise. | ||
10 | |||
11 | This approach is more nuanced, but should provide a better experience for | ||
12 | users: | ||
13 | |||
14 | - Previusly we would set LESSSECURE=1 and trust the pager to make use of | ||
15 | it. But this has an effect only on less. We need to not start pagers which | ||
16 | are insecure when in secure mode. In particular more is like that and is a | ||
17 | very popular pager. | ||
18 | |||
19 | - We don't enable secure mode always, which means that those other pagers can | ||
20 | reasonably used. | ||
21 | |||
22 | - We do the right thing by default, but the user has ultimate control by | ||
23 | setting SYSTEMD_PAGERSECURE. | ||
24 | |||
25 | Fixes #5666. | ||
26 | |||
27 | v2: | ||
28 | - also check $PKEXEC_UID | ||
29 | |||
30 | v3: | ||
31 | - use 'sd_pid_get_owner_uid() != geteuid()' as the condition | ||
32 | |||
33 | CVE: CVE-2023-26604 | ||
34 | Upstream-Status: Backport [https://github.com/systemd/systemd/pull/17270/commits/0a42426d797406b4b01a0d9c13bb759c2629d108] | ||
35 | Comments: Hunk refreshed | ||
36 | Signed-off-by: rajmohan r <rajmohan.r@kpit.com> | ||
37 | --- | ||
38 | man/less-variables.xml | 30 +++++++++++++++---- | ||
39 | src/shared/pager.c | 63 ++++++++++++++++++++++++++------------- | ||
40 | 2 files changed, 66 insertions(+), 27 deletions(-) | ||
41 | |||
42 | diff --git a/man/less-variables.xml b/man/less-variables.xml | ||
43 | index c52511c..049e9f7 100644 | ||
44 | --- a/man/less-variables.xml | ||
45 | +++ b/man/less-variables.xml | ||
46 | @@ -65,12 +65,30 @@ | ||
47 | </varlistentry> | ||
48 | |||
49 | <varlistentry id='lesssecure'> | ||
50 | - <term><varname>$SYSTEMD_LESSSECURE</varname></term> | ||
51 | - | ||
52 | - <listitem><para>Takes a boolean argument. Overrides the <varname>$LESSSECURE</varname> environment | ||
53 | - variable when invoking the pager, which controls the "secure" mode of less (which disables commands | ||
54 | - such as <literal>|</literal> which allow to easily shell out to external command lines). By default | ||
55 | - less secure mode is enabled, with this setting it may be disabled.</para></listitem> | ||
56 | + <term><varname>$SYSTEMD_PAGERSECURE</varname></term> | ||
57 | + | ||
58 | + <listitem><para>Takes a boolean argument. When true, the "secure" mode of the pager is enabled; if | ||
59 | + false, disabled. If <varname>$SYSTEMD_PAGERSECURE</varname> is not set at all, secure mode is enabled | ||
60 | + if the effective UID is not the same as the owner of the login session, see <citerefentry | ||
61 | + project='man-pages'><refentrytitle>geteuid</refentrytitle><manvolnum>2</manvolnum></citerefentry> and | ||
62 | + <citerefentry><refentrytitle>sd_pid_get_owner_uid</refentrytitle><manvolnum>3</manvolnum></citerefentry>. | ||
63 | + In secure mode, <option>LESSSECURE=1</option> will be set when invoking the pager, and the pager shall | ||
64 | + disable commands that open or create new files or start new subprocesses. When | ||
65 | + <varname>$SYSTEMD_PAGERSECURE</varname> is not set at all, pagers which are not known to implement | ||
66 | + secure mode will not be used. (Currently only | ||
67 | + <citerefentry><refentrytitle>less</refentrytitle><manvolnum>1</manvolnum></citerefentry> implements | ||
68 | + secure mode.)</para> | ||
69 | + | ||
70 | + <para>Note: when commands are invoked with elevated privileges, for example under <citerefentry | ||
71 | + project='man-pages'><refentrytitle>sudo</refentrytitle><manvolnum>8</manvolnum></citerefentry> or | ||
72 | + <citerefentry | ||
73 | + project='die-net'><refentrytitle>pkexec</refentrytitle><manvolnum>1</manvolnum></citerefentry>, care | ||
74 | + must be taken to ensure that unintended interactive features are not enabled. "Secure" mode for the | ||
75 | + pager may be enabled automatically as describe above. Setting <varname>SYSTEMD_PAGERSECURE=0</varname> | ||
76 | + or not removing it from the inherited environment allows the user to invoke arbitrary commands. Note | ||
77 | + that if the <varname>$SYSTEMD_PAGER</varname> or <varname>$PAGER</varname> variables are to be | ||
78 | + honoured, <varname>$SYSTEMD_PAGERSECURE</varname> must be set too. It might be reasonable to completly | ||
79 | + disable the pager using <option>--no-pager</option> instead.</para></listitem> | ||
80 | </varlistentry> | ||
81 | |||
82 | <varlistentry id='colors'> | ||
83 | diff --git a/src/shared/pager.c b/src/shared/pager.c | ||
84 | index a3b6576..a72d9ea 100644 | ||
85 | --- a/src/shared/pager.c | ||
86 | +++ b/src/shared/pager.c | ||
87 | @@ -8,6 +8,8 @@ | ||
88 | #include <sys/prctl.h> | ||
89 | #include <unistd.h> | ||
90 | |||
91 | +#include "sd-login.h" | ||
92 | + | ||
93 | #include "copy.h" | ||
94 | #include "env-util.h" | ||
95 | #include "fd-util.h" | ||
96 | @@ -164,25 +166,42 @@ int pager_open(PagerFlags flags) { | ||
97 | } | ||
98 | |||
99 | /* People might invoke us from sudo, don't needlessly allow less to be a way to shell out | ||
100 | - * privileged stuff. */ | ||
101 | - r = getenv_bool("SYSTEMD_LESSSECURE"); | ||
102 | - if (r == 0) { /* Remove env var if off */ | ||
103 | - if (unsetenv("LESSSECURE") < 0) { | ||
104 | - log_error_errno(errno, "Failed to uset environment variable LESSSECURE: %m"); | ||
105 | - _exit(EXIT_FAILURE); | ||
106 | - } | ||
107 | - } else { | ||
108 | - /* Set env var otherwise */ | ||
109 | + * privileged stuff. If the user set $SYSTEMD_PAGERSECURE, trust their configuration of the | ||
110 | + * pager. If they didn't, use secure mode when under euid is changed. If $SYSTEMD_PAGERSECURE | ||
111 | + * wasn't explicitly set, and we autodetect the need for secure mode, only use the pager we | ||
112 | + * know to be good. */ | ||
113 | + int use_secure_mode = getenv_bool("SYSTEMD_PAGERSECURE"); | ||
114 | + bool trust_pager = use_secure_mode >= 0; | ||
115 | + if (use_secure_mode == -ENXIO) { | ||
116 | + uid_t uid; | ||
117 | + | ||
118 | + r = sd_pid_get_owner_uid(0, &uid); | ||
119 | if (r < 0) | ||
120 | - log_warning_errno(r, "Unable to parse $SYSTEMD_LESSSECURE, ignoring: %m"); | ||
121 | + log_debug_errno(r, "sd_pid_get_owner_uid() failed, enabling pager secure mode: %m"); | ||
122 | |||
123 | - if (setenv("LESSSECURE", "1", 1) < 0) { | ||
124 | - log_error_errno(errno, "Failed to set environment variable LESSSECURE: %m"); | ||
125 | - _exit(EXIT_FAILURE); | ||
126 | - } | ||
127 | + use_secure_mode = r < 0 || uid != geteuid(); | ||
128 | + | ||
129 | + } else if (use_secure_mode < 0) { | ||
130 | + log_warning_errno(use_secure_mode, "Unable to parse $SYSTEMD_PAGERSECURE, assuming true: %m"); | ||
131 | + use_secure_mode = true; | ||
132 | } | ||
133 | |||
134 | - if (pager_args) { | ||
135 | + /* We generally always set variables used by less, even if we end up using a different pager. | ||
136 | + * They shouldn't hurt in any case, and ideally other pagers would look at them too. */ | ||
137 | + if (use_secure_mode) | ||
138 | + r = setenv("LESSSECURE", "1", 1); | ||
139 | + else | ||
140 | + r = unsetenv("LESSSECURE"); | ||
141 | + if (r < 0) { | ||
142 | + log_error_errno(errno, "Failed to adjust environment variable LESSSECURE: %m"); | ||
143 | + _exit(EXIT_FAILURE); | ||
144 | + } | ||
145 | + | ||
146 | + if (trust_pager && pager_args) { /* The pager config might be set globally, and we cannot | ||
147 | + * know if the user adjusted it to be appropriate for the | ||
148 | + * secure mode. Thus, start the pager specified through | ||
149 | + * envvars only when $SYSTEMD_PAGERSECURE was explicitly set | ||
150 | + * as well. */ | ||
151 | r = loop_write(exe_name_pipe[1], pager_args[0], strlen(pager_args[0]) + 1, false); | ||
152 | if (r < 0) { | ||
153 | log_error_errno(r, "Failed to write pager name to socket: %m"); | ||
154 | @@ -194,13 +213,14 @@ int pager_open(PagerFlags flags) { | ||
155 | "Failed to execute '%s', using fallback pagers: %m", pager_args[0]); | ||
156 | } | ||
157 | |||
158 | - /* Debian's alternatives command for pagers is | ||
159 | - * called 'pager'. Note that we do not call | ||
160 | - * sensible-pagers here, since that is just a | ||
161 | - * shell script that implements a logic that | ||
162 | - * is similar to this one anyway, but is | ||
163 | - * Debian-specific. */ | ||
164 | + /* Debian's alternatives command for pagers is called 'pager'. Note that we do not call | ||
165 | + * sensible-pagers here, since that is just a shell script that implements a logic that is | ||
166 | + * similar to this one anyway, but is Debian-specific. */ | ||
167 | FOREACH_STRING(exe, "pager", "less", "more") { | ||
168 | + /* Only less implements secure mode right now. */ | ||
169 | + if (use_secure_mode && !streq(exe, "less")) | ||
170 | + continue; | ||
171 | + | ||
172 | r = loop_write(exe_name_pipe[1], exe, strlen(exe) + 1, false); | ||
173 | if (r < 0) { | ||
174 | log_error_errno(r, "Failed to write pager name to socket: %m"); | ||
175 | @@ -211,6 +231,7 @@ int pager_open(PagerFlags flags) { | ||
176 | "Failed to execute '%s', using next fallback pager: %m", exe); | ||
177 | } | ||
178 | |||
179 | + /* Our builtin is also very secure. */ | ||
180 | r = loop_write(exe_name_pipe[1], "(built-in)", strlen("(built-in)") + 1, false); | ||
181 | if (r < 0) { | ||
182 | log_error_errno(r, "Failed to write pager name to socket: %m"); | ||
diff --git a/meta/recipes-core/systemd/systemd/CVE-2023-26604-4.patch b/meta/recipes-core/systemd/systemd/CVE-2023-26604-4.patch new file mode 100644 index 0000000000..bc6b0a91c2 --- /dev/null +++ b/meta/recipes-core/systemd/systemd/CVE-2023-26604-4.patch | |||
@@ -0,0 +1,32 @@ | |||
1 | From b8f736b30e20a2b44e7c34bb4e43b0d97ae77e3c Mon Sep 17 00:00:00 2001 | ||
2 | From: Lennart Poettering <lennart@poettering.net> | ||
3 | Date: Thu, 15 Oct 2020 10:54:48 +0200 | ||
4 | Subject: [PATCH] pager: lets check SYSTEMD_PAGERSECURE with secure_getenv() | ||
5 | |||
6 | I can't think of any real vulnerability about this, but it still feels | ||
7 | better to check a variable with "secure" in its name with | ||
8 | secure_getenv() rather than plain getenv(). | ||
9 | |||
10 | Paranoia FTW! | ||
11 | |||
12 | CVE: CVE-2023-26604 | ||
13 | Upstream-Status: Backport [https://github.com/systemd/systemd/pull/17359/commits/b8f736b30e20a2b44e7c34bb4e43b0d97ae77e3c] | ||
14 | Comments: Hunk refreshed | ||
15 | Signed-off-by: rajmohan r <rajmohan.r@kpit.com> | ||
16 | --- | ||
17 | src/shared/pager.c | 2 +- | ||
18 | 1 file changed, 1 insertion(+), 1 deletion(-) | ||
19 | |||
20 | diff --git a/src/shared/pager.c b/src/shared/pager.c | ||
21 | index a72d9ea..250519c 100644 | ||
22 | --- a/src/shared/pager.c | ||
23 | +++ b/src/shared/pager.c | ||
24 | @@ -170,7 +170,7 @@ int pager_open(PagerFlags flags) { | ||
25 | * pager. If they didn't, use secure mode when under euid is changed. If $SYSTEMD_PAGERSECURE | ||
26 | * wasn't explicitly set, and we autodetect the need for secure mode, only use the pager we | ||
27 | * know to be good. */ | ||
28 | - int use_secure_mode = getenv_bool("SYSTEMD_PAGERSECURE"); | ||
29 | + int use_secure_mode = getenv_bool_secure("SYSTEMD_PAGERSECURE"); | ||
30 | bool trust_pager = use_secure_mode >= 0; | ||
31 | if (use_secure_mode == -ENXIO) { | ||
32 | uid_t uid; | ||
diff --git a/meta/recipes-core/systemd/systemd_244.5.bb b/meta/recipes-core/systemd/systemd_244.5.bb index 8dd59f7636..bd66d82932 100644 --- a/meta/recipes-core/systemd/systemd_244.5.bb +++ b/meta/recipes-core/systemd/systemd_244.5.bb | |||
@@ -35,6 +35,10 @@ SRC_URI += "file://touchscreen.rules \ | |||
35 | file://CVE-2021-3997-2.patch \ | 35 | file://CVE-2021-3997-2.patch \ |
36 | file://CVE-2021-3997-3.patch \ | 36 | file://CVE-2021-3997-3.patch \ |
37 | file://CVE-2022-3821.patch \ | 37 | file://CVE-2022-3821.patch \ |
38 | file://CVE-2023-26604-1.patch \ | ||
39 | file://CVE-2023-26604-2.patch \ | ||
40 | file://CVE-2023-26604-3.patch \ | ||
41 | file://CVE-2023-26604-4.patch \ | ||
38 | " | 42 | " |
39 | 43 | ||
40 | # patches needed by musl | 44 | # patches needed by musl |