merged

Bruce

In message: [meta-virtualization][scarthgap][PATCHv2] docker-moby: Security fix 
for CVE-2024-41110
on 11/02/2026 Siddharth Doshi via lists.yoctoproject.org wrote:

> From: Siddharth Doshi <[email protected]>
> 
> The patches are taken from LTS branch 20.10 of moby.
> 
> Upstream-Status: Backport from 
> [https://github.com/moby/moby/commit/88c4b7690840044ce15489699294ec7c5dadf5dd]
> 
> Signed-off-by: Siddharth Doshi <[email protected]>
> ---
>  recipes-containers/docker/docker-moby_git.bb  |   2 +
>  .../docker/files/CVE-2024-41110_1.patch       | 177 ++++++++++++++++++
>  .../docker/files/CVE-2024-41110_2.patch       |  99 ++++++++++
>  3 files changed, 278 insertions(+)
>  create mode 100644 recipes-containers/docker/files/CVE-2024-41110_1.patch
>  create mode 100644 recipes-containers/docker/files/CVE-2024-41110_2.patch
> 
> diff --git a/recipes-containers/docker/docker-moby_git.bb 
> b/recipes-containers/docker/docker-moby_git.bb
> index 1331930e..b1b2cbb5 100644
> --- a/recipes-containers/docker/docker-moby_git.bb
> +++ b/recipes-containers/docker/docker-moby_git.bb
> @@ -59,6 +59,8 @@ SRC_URI = "\
>          file://CVE-2024-36620.patch;patchdir=src/import \
>          file://CVE-2024-36621.patch;patchdir=src/import \
>          file://CVE-2024-29018.patch;patchdir=src/import \
> +        file://CVE-2024-41110_1.patch;patchdir=src/import \
> +        file://CVE-2024-41110_2.patch;patchdir=src/import \
>       "
>  
>  DOCKER_COMMIT = "${SRCREV_moby}"
> diff --git a/recipes-containers/docker/files/CVE-2024-41110_1.patch 
> b/recipes-containers/docker/files/CVE-2024-41110_1.patch
> new file mode 100644
> index 00000000..7f74348a
> --- /dev/null
> +++ b/recipes-containers/docker/files/CVE-2024-41110_1.patch
> @@ -0,0 +1,177 @@
> +From 88c4b7690840044ce15489699294ec7c5dadf5dd Mon Sep 17 00:00:00 2001
> +From: Jameson Hyde <[email protected]>
> +Date: Mon, 26 Nov 2018 14:15:22 -0500
> +Subject: [PATCH] Authz plugin security fixes for 0-length content and path
> + validation Signed-off-by: Jameson Hyde <[email protected]>
> +MIME-Version: 1.0
> +Content-Type: text/plain; charset=UTF-8
> +Content-Transfer-Encoding: 8bit
> +
> +fix comments
> +
> +(cherry picked from commit 9659c3a52bac57e615b5fb49b0652baca448643e)
> +Signed-off-by: Paweł Gronowski <[email protected]>
> +(cherry picked from commit 2ac8a479c53d9b8e67c55f1e283da9d85d2b3415)
> +Signed-off-by: Paweł Gronowski <[email protected]>
> +
> +Upstream-Status: Backport from 
> [https://github.com/moby/moby/commit/88c4b7690840044ce15489699294ec7c5dadf5dd]
> +CVE: CVE-2024-41110
> +Signed-off-by: Siddharth Doshi <[email protected]>
> +---
> + pkg/authorization/authz.go           | 38 ++++++++++++++++++---
> + pkg/authorization/authz_unix_test.go | 49 ++++++++++++++++++++++++++--
> + 2 files changed, 80 insertions(+), 7 deletions(-)
> +
> +diff --git a/pkg/authorization/authz.go b/pkg/authorization/authz.go
> +index 1eb44315dd..4c2e90b251 100644
> +--- a/pkg/authorization/authz.go
> ++++ b/pkg/authorization/authz.go
> +@@ -8,6 +8,8 @@ import (
> +     "io"
> +     "mime"
> +     "net/http"
> ++    "net/url"
> ++    "regexp"
> +     "strings"
> + 
> +     "github.com/containerd/log"
> +@@ -53,10 +55,23 @@ type Ctx struct {
> +     authReq *Request
> + }
> + 
> ++func isChunked(r *http.Request) bool {
> ++    // RFC 7230 specifies that content length is to be ignored if 
> Transfer-Encoding is chunked
> ++    if strings.ToLower(r.Header.Get("Transfer-Encoding")) == "chunked" {
> ++            return true
> ++    }
> ++    for _, v := range r.TransferEncoding {
> ++            if 0 == strings.Compare(strings.ToLower(v), "chunked") {
> ++                    return true
> ++            }
> ++    }
> ++    return false
> ++}
> ++
> + // AuthZRequest authorized the request to the docker daemon using authZ 
> plugins
> + func (ctx *Ctx) AuthZRequest(w http.ResponseWriter, r *http.Request) error {
> +     var body []byte
> +-    if sendBody(ctx.requestURI, r.Header) && r.ContentLength > 0 && 
> r.ContentLength < maxBodySize {
> ++    if sendBody(ctx.requestURI, r.Header) && (r.ContentLength > 0 || 
> isChunked(r)) && r.ContentLength < maxBodySize {
> +             var err error
> +             body, r.Body, err = drainBody(r.Body)
> +             if err != nil {
> +@@ -109,7 +124,6 @@ func (ctx *Ctx) AuthZResponse(rm ResponseModifier, r 
> *http.Request) error {
> +     if sendBody(ctx.requestURI, rm.Header()) {
> +             ctx.authReq.ResponseBody = rm.RawBody()
> +     }
> +-
> +     for _, plugin := range ctx.plugins {
> +             log.G(context.TODO()).Debugf("AuthZ response using plugin %s", 
> plugin.Name())
> + 
> +@@ -147,10 +161,26 @@ func drainBody(body io.ReadCloser) ([]byte, 
> io.ReadCloser, error) {
> +     return nil, newBody, err
> + }
> + 
> ++func isAuthEndpoint(urlPath string) (bool, error) {
> ++    // eg 
> www.test.com/v1.24/auth/optional?optional1=something&optional2=something 
> (version optional)
> ++    matched, err := regexp.MatchString(`^[^\/]+\/(v\d[\d\.]*\/)?auth.*`, 
> urlPath)
> ++    if err != nil {
> ++            return false, err
> ++    }
> ++    return matched, nil
> ++}
> ++
> + // sendBody returns true when request/response body should be sent to 
> AuthZPlugin
> +-func sendBody(url string, header http.Header) bool {
> ++func sendBody(inURL string, header http.Header) bool {
> ++    u, err := url.Parse(inURL)
> ++    // Assume no if the URL cannot be parsed - an empty request will still 
> be forwarded to the plugin and should be rejected
> ++    if err != nil {
> ++            return false
> ++    }
> ++
> +     // Skip body for auth endpoint
> +-    if strings.HasSuffix(url, "/auth") {
> ++    isAuth, err := isAuthEndpoint(u.Path)
> ++    if isAuth || err != nil {
> +             return false
> +     }
> + 
> +diff --git a/pkg/authorization/authz_unix_test.go 
> b/pkg/authorization/authz_unix_test.go
> +index c9b18d96e9..275f1dd3d0 100644
> +--- a/pkg/authorization/authz_unix_test.go
> ++++ b/pkg/authorization/authz_unix_test.go
> +@@ -174,8 +174,8 @@ func TestDrainBody(t *testing.T) {
> + 
> + func TestSendBody(t *testing.T) {
> +     var (
> +-            url       = "nothing.com"
> +             testcases = []struct {
> ++                    url         string
> +                     contentType string
> +                     expected    bool
> +             }{
> +@@ -219,15 +219,58 @@ func TestSendBody(t *testing.T) {
> +                             contentType: "",
> +                             expected:    false,
> +                     },
> ++                    {
> ++                            url:         "nothing.com/auth",
> ++                            contentType: "",
> ++                            expected:    false,
> ++                    },
> ++                    {
> ++                            url:         "nothing.com/auth",
> ++                            contentType: "application/json;charset=UTF8",
> ++                            expected:    false,
> ++                    },
> ++                    {
> ++                            url:         "nothing.com/auth?p1=test",
> ++                            contentType: "application/json;charset=UTF8",
> ++                            expected:    false,
> ++                    },
> ++                    {
> ++                            url:         "nothing.com/test?p1=/auth",
> ++                            contentType: "application/json;charset=UTF8",
> ++                            expected:    true,
> ++                    },
> ++                    {
> ++                            url:         "nothing.com/something/auth",
> ++                            contentType: "application/json;charset=UTF8",
> ++                            expected:    true,
> ++                    },
> ++                    {
> ++                            url:         "nothing.com/auth/test",
> ++                            contentType: "application/json;charset=UTF8",
> ++                            expected:    false,
> ++                    },
> ++                    {
> ++                            url:         "nothing.com/v1.24/auth/test",
> ++                            contentType: "application/json;charset=UTF8",
> ++                            expected:    false,
> ++                    },
> ++                    {
> ++                            url:         "nothing.com/v1/auth/test",
> ++                            contentType: "application/json;charset=UTF8",
> ++                            expected:    false,
> ++                    },
> +             }
> +     )
> + 
> +     for _, testcase := range testcases {
> +             header := http.Header{}
> +             header.Set("Content-Type", testcase.contentType)
> ++            if testcase.url == "" {
> ++                    testcase.url = "nothing.com"
> ++            }
> + 
> +-            if b := sendBody(url, header); b != testcase.expected {
> +-                    t.Fatalf("Unexpected Content-Type; Expected: %t, 
> Actual: %t", testcase.expected, b)
> ++            if b := sendBody(testcase.url, header); b != testcase.expected {
> ++                    t.Fatalf("sendBody failed: url: %s, content-type: %s; 
> Expected: %t, Actual: %t", testcase.url, testcase.contentType, 
> testcase.expected, b)
> +             }
> +     }
> + }
> +-- 
> +2.44.4
> +
> diff --git a/recipes-containers/docker/files/CVE-2024-41110_2.patch 
> b/recipes-containers/docker/files/CVE-2024-41110_2.patch
> new file mode 100644
> index 00000000..48f21b52
> --- /dev/null
> +++ b/recipes-containers/docker/files/CVE-2024-41110_2.patch
> @@ -0,0 +1,99 @@
> +From 8fc313c00169d14f1712d5661306d9e0c8838257 Mon Sep 17 00:00:00 2001
> +From: Jameson Hyde <[email protected]>
> +Date: Sat, 1 Dec 2018 11:25:49 -0500
> +Subject: [PATCH 2/2] If url includes scheme, urlPath will drop hostname, 
> which
> + would not match the auth check
> +MIME-Version: 1.0
> +Content-Type: text/plain; charset=UTF-8
> +Content-Transfer-Encoding: 8bit
> +
> +Signed-off-by: Jameson Hyde <[email protected]>
> +(cherry picked from commit 754fb8d9d03895ae3ab60d2ad778152b0d835206)
> +Signed-off-by: Paweł Gronowski <[email protected]>
> +(cherry picked from commit 5282cb25d09db924fa92fdb8fb7a9bd20bb845b7)
> +Signed-off-by: Paweł Gronowski <[email protected]>
> +
> +Upstream-Status: Backport from 
> [https://github.com/moby/moby/commit/7ff423cc1c991d8dc0a7b5d1d93e1cf3efaac169]
> +CVE: CVE-2024-41110
> +Signed-off-by: Siddharth Doshi <[email protected]>
> +---
> + pkg/authorization/authz.go           |  6 ++---
> + pkg/authorization/authz_unix_test.go | 35 ++++++++++++++++++++++++++++
> + 2 files changed, 38 insertions(+), 3 deletions(-)
> +
> +diff --git a/pkg/authorization/authz.go b/pkg/authorization/authz.go
> +index 4c2e90b251..d568a2b597 100644
> +--- a/pkg/authorization/authz.go
> ++++ b/pkg/authorization/authz.go
> +@@ -57,11 +57,11 @@ type Ctx struct {
> + 
> + func isChunked(r *http.Request) bool {
> +     // RFC 7230 specifies that content length is to be ignored if 
> Transfer-Encoding is chunked
> +-    if strings.ToLower(r.Header.Get("Transfer-Encoding")) == "chunked" {
> ++    if strings.EqualFold(r.Header.Get("Transfer-Encoding"), "chunked") {
> +             return true
> +     }
> +     for _, v := range r.TransferEncoding {
> +-            if 0 == strings.Compare(strings.ToLower(v), "chunked") {
> ++            if strings.EqualFold(v, "chunked") {
> +                     return true
> +             }
> +     }
> +@@ -163,7 +163,7 @@ func drainBody(body io.ReadCloser) ([]byte, 
> io.ReadCloser, error) {
> + 
> + func isAuthEndpoint(urlPath string) (bool, error) {
> +     // eg 
> www.test.com/v1.24/auth/optional?optional1=something&optional2=something 
> (version optional)
> +-    matched, err := regexp.MatchString(`^[^\/]+\/(v\d[\d\.]*\/)?auth.*`, 
> urlPath)
> ++    matched, err := regexp.MatchString(`^[^\/]*\/(v\d[\d\.]*\/)?auth.*`, 
> urlPath)
> +     if err != nil {
> +             return false, err
> +     }
> +diff --git a/pkg/authorization/authz_unix_test.go 
> b/pkg/authorization/authz_unix_test.go
> +index 275f1dd3d0..66b4d20452 100644
> +--- a/pkg/authorization/authz_unix_test.go
> ++++ b/pkg/authorization/authz_unix_test.go
> +@@ -259,6 +259,41 @@ func TestSendBody(t *testing.T) {
> +                             contentType: "application/json;charset=UTF8",
> +                             expected:    false,
> +                     },
> ++                    {
> ++                            url:         "www.nothing.com/v1.24/auth/test",
> ++                            contentType: "application/json;charset=UTF8",
> ++                            expected:    false,
> ++                    },
> ++                    {
> ++                            url:         
> "https://www.nothing.com/v1.24/auth/test";,
> ++                            contentType: "application/json;charset=UTF8",
> ++                            expected:    false,
> ++                    },
> ++                    {
> ++                            url:         
> "http://nothing.com/v1.24/auth/test";,
> ++                            contentType: "application/json;charset=UTF8",
> ++                            expected:    false,
> ++                    },
> ++                    {
> ++                            url:         "www.nothing.com/test?p1=/auth",
> ++                            contentType: "application/json;charset=UTF8",
> ++                            expected:    true,
> ++                    },
> ++                    {
> ++                            url:         
> "http://www.nothing.com/test?p1=/auth";,
> ++                            contentType: "application/json;charset=UTF8",
> ++                            expected:    true,
> ++                    },
> ++                    {
> ++                            url:         "www.nothing.com/something/auth",
> ++                            contentType: "application/json;charset=UTF8",
> ++                            expected:    true,
> ++                    },
> ++                    {
> ++                            url:         
> "https://www.nothing.com/something/auth";,
> ++                            contentType: "application/json;charset=UTF8",
> ++                            expected:    true,
> ++                    },
> +             }
> +     )
> + 
> +-- 
> +2.44.4
> +
> -- 
> 2.34.1
> 

> 
> 
> 

-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#9603): 
https://lists.yoctoproject.org/g/meta-virtualization/message/9603
Mute This Topic: https://lists.yoctoproject.org/mt/117760264/21656
Group Owner: [email protected]
Unsubscribe: https://lists.yoctoproject.org/g/meta-virtualization/unsub 
[[email protected]]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to