Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Match VT device paths to be blocked from mounting exactly #17104

Closed
wants to merge 1 commit into from

Conversation

fho
Copy link
Contributor

@fho fho commented Jan 13, 2023

As @mheon pointed out in PR #170551, isVirtualConsoleDevice() does not only matches VT device paths but also devices named like /dev/tty0abcd.
This causes that non VT device paths named /dev/tty[0-9]+[A-Za-z]+ are not mounted into privileged container and systemd containers accidentally.

This is an unlikely issue because the Linux kernel does not use device paths like that.
To make it failproof and prevent issues in unlikely scenarios, change isVirtualConsoleDevice() to exactly match ^/dev/tty[0-9]+$ paths.

Because it is not possible to match this path exactly with Glob syntax, the path is now checked with strings.TrimPrefix() and strconv.ParseUint().
ParseUint uses a bitsize of 16, this is sufficient because the max number of TTY devices is 512 in Linux 6.1.5.
(Checked via 'git grep -e '#define' --and -e 'TTY_MINORS').

The commit also adds a unit-test for isVirtualConsoleDevice().

Fixes: f4c81b0 ("Only prevent VTs to be mounted inside...")

Signed-off-by: Fabian Holler mail@fholler.de

Does this PR introduce a user-facing change?

None

Footnotes

  1. https://github.com/containers/podman/pull/17055#issuecomment-1378904068

@mupuf
Copy link
Contributor

mupuf commented Jan 13, 2023

Looks good to me: Acked-by: Martin Roukala <martin.roukala@mupuf.org>

As @mheon pointed out in PR containers#17055[^1], isVirtualConsoleDevice() does
not only matches VT device paths but also devices named like
/dev/tty0abcd.
This causes that non VT device paths named /dev/tty[0-9]+[A-Za-z]+ are
not mounted into privileged container and systemd containers accidentally.

This is an unlikely issue because the Linux kernel does not use device
paths like that.
To make it failproof and prevent issues in unlikely scenarios, change
isVirtualConsoleDevice() to exactly match ^/dev/tty[0-9]+$ paths.

Because it is not possible to match this path exactly with Glob syntax,
the path is now checked with strings.TrimPrefix() and
strconv.ParseUint().
ParseUint uses a bitsize of 16, this is sufficient because the max
number of TTY devices is 512 in Linux 6.1.5.
(Checked via 'git grep -e '#define' --and -e 'TTY_MINORS').

The commit also adds a unit-test for isVirtualConsoleDevice().

Fixes: f4c81b0 ("Only prevent VTs to be mounted inside...")

[^1]: containers#17055 (comment)

Signed-off-by: Fabian Holler <mail@fholler.de>
@fho
Copy link
Contributor Author

fho commented Jan 20, 2023

CI errors look unrelated:

[+1442s] # #|     FAIL: arch list in manifest
[+1442s] # #| expected: = '386 amd64 arm arm arm64 ppc64le s390x'
[+1442s] # #|   actual:   '386 amd64 arm arm64 ppc64le s390x'

@fho fho requested review from rhatdan and mheon and removed request for rhatdan January 20, 2023 15:29
@rhatdan
Copy link
Member

rhatdan commented Jan 20, 2023

LGTM

@mheon
Copy link
Member

mheon commented Jan 20, 2023

/lgtm
/hold

@openshift-ci openshift-ci bot added the do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. label Jan 20, 2023
@openshift-ci openshift-ci bot added the lgtm Indicates that a PR is ready to be merged. label Jan 20, 2023
@rhatdan
Copy link
Member

rhatdan commented Jan 23, 2023

/approve

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Jan 23, 2023

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: fho, mupuf, rhatdan

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci openshift-ci bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Jan 23, 2023
@rhatdan rhatdan added the 4.4 label Jan 25, 2023
@rhatdan
Copy link
Member

rhatdan commented Jan 26, 2023

Could you rebase this PR, it does not seem to be getting beyond the podman build tests.

@fho
Copy link
Contributor Author

fho commented Jan 30, 2023

already merged via #17265
PR is obsolete

@fho fho closed this Jan 30, 2023
@fho fho deleted the isvcdev_exact branch January 30, 2023 17:17
@rhatdan
Copy link
Member

rhatdan commented Jan 31, 2023

Thanks @fho for the PR.

@github-actions github-actions bot added the locked - please file new issue/PR Assist humans wanting to comment on an old issue or PR with locked comments. label Sep 12, 2023
@github-actions github-actions bot locked as resolved and limited conversation to collaborators Sep 12, 2023
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. lgtm Indicates that a PR is ready to be merged. locked - please file new issue/PR Assist humans wanting to comment on an old issue or PR with locked comments. release-note-none
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants