Package: release.debian.org Severity: normal Tags: bookworm X-Debbugs-Cc: docker...@packages.debian.org, secur...@debian.org Control: affects -1 + src:docker.io User: release.debian....@packages.debian.org Usertags: pu Control: tags -1 + security
[ Reason ] CVE-2024-41110 [ Impact ] Authentification bypass [ Tests ] Yes added to test suite [ Risks ] Low code is tested. Patch is official [ Checklist ] [X] *all* changes are documented in the d/changelog [X] I reviewed all changes and I approve them [X] attach debdiff against the package in (old)stable [X] the issue is verified as fixed in unstable [ Changes ] - Fix CVE-2024-41110 - Fix of salsaCI to bookworm [ Other info ] May be worth a DSA due to popcon
diff -Nru docker.io-20.10.24+dfsg1/debian/changelog docker.io-20.10.24+dfsg1/debian/changelog --- docker.io-20.10.24+dfsg1/debian/changelog 2023-04-05 15:19:59.000000000 +0000 +++ docker.io-20.10.24+dfsg1/debian/changelog 2024-10-12 15:19:49.000000000 +0000 @@ -1,3 +1,15 @@ +docker.io (20.10.24+dfsg1-1+deb12u1) bookworm-security; urgency=high + + * Team upload + * Fix CVE-2024-41110: Authz zero length regression + A security vulnerability has been detected in Docker Engine, + which could allow an attacker + to bypass authorization plugins (AuthZ) under specific + circumstances. The base likelihood of this being exploited is low. + (Closes: #1084993) + + -- Bastien Roucari??s <ro...@debian.org> Sat, 12 Oct 2024 15:19:49 +0000 + docker.io (20.10.24+dfsg1-1) unstable; urgency=medium * Team upload. diff -Nru docker.io-20.10.24+dfsg1/debian/gbp.conf docker.io-20.10.24+dfsg1/debian/gbp.conf --- docker.io-20.10.24+dfsg1/debian/gbp.conf 2023-01-14 08:55:59.000000000 +0000 +++ docker.io-20.10.24+dfsg1/debian/gbp.conf 2024-10-12 15:19:49.000000000 +0000 @@ -1,2 +1,2 @@ [DEFAULT] -debian-branch = master +debian-branch = debian/bookworm diff -Nru docker.io-20.10.24+dfsg1/debian/.gitlab-ci.yml docker.io-20.10.24+dfsg1/debian/.gitlab-ci.yml --- docker.io-20.10.24+dfsg1/debian/.gitlab-ci.yml 2023-01-14 08:55:59.000000000 +0000 +++ docker.io-20.10.24+dfsg1/debian/.gitlab-ci.yml 1970-01-01 00:00:00.000000000 +0000 @@ -1,29 +0,0 @@ ---- -# https://docs.gitlab.com/ce/ci/yaml/#include -include: - - remote: https://salsa.debian.org/onlyjob/ci/raw/master/onlyjob-ci.yml - -## "amd64-unstable" always runs by default followed by lintian. - -## Only for arch:all packages: -binary-indep: - extends: .build-indep - -## Job to check Build-Depends versioning: -amd64-testing_unstable: - extends: .build - variables: - arch: amd64 - dist: testing_unstable - -i386-unstable: - extends: .build - variables: - arch: i386 - dist: unstable - -amd64-experimental: - extends: .build - variables: - arch: amd64 - dist: experimental diff -Nru docker.io-20.10.24+dfsg1/debian/gitlab-ci.yml docker.io-20.10.24+dfsg1/debian/gitlab-ci.yml --- docker.io-20.10.24+dfsg1/debian/gitlab-ci.yml 2023-01-14 08:55:59.000000000 +0000 +++ docker.io-20.10.24+dfsg1/debian/gitlab-ci.yml 2024-10-12 15:19:49.000000000 +0000 @@ -4,3 +4,5 @@ --- include: - https://salsa.debian.org/go-team/infra/pkg-go-tools/-/raw/master/pipeline/test-archive.yml +variables: + RELEASE: 'bookworm' diff -Nru docker.io-20.10.24+dfsg1/debian/patches/CVE-2024-41110.patch docker.io-20.10.24+dfsg1/debian/patches/CVE-2024-41110.patch --- docker.io-20.10.24+dfsg1/debian/patches/CVE-2024-41110.patch 1970-01-01 00:00:00.000000000 +0000 +++ docker.io-20.10.24+dfsg1/debian/patches/CVE-2024-41110.patch 2024-10-12 15:19:49.000000000 +0000 @@ -0,0 +1,180 @@ +From 88c4b7690840044ce15489699294ec7c5dadf5dd Mon Sep 17 00:00:00 2001 +From: Jameson Hyde <jameson.h...@docker.com> +Date: Mon, 26 Nov 2018 14:15:22 -0500 +Subject: CVE-2024-41110 [PATCH] Authz plugin security fixes for 0-length content and path + validation Signed-off-by: Jameson Hyde <jameson.h...@docker.com> +MIME-Version: 1.0 +Content-Type: text/plain; charset=UTF-8 +Content-Transfer-Encoding: 8bit + +fix comments + +[debian description] +A security vulnerability has been detected in certain versions of Docker Engine, +which could allow an attacker to bypass authorization plugins (AuthZ) +under specific circumstances. The base likelihood of this being exploited +is low. + +(cherry picked from commit 9659c3a52bac57e615b5fb49b0652baca448643e) +Signed-off-by: Pawe?? Gronowski <pawel.gronow...@docker.com> +(cherry picked from commit 2ac8a479c53d9b8e67c55f1e283da9d85d2b3415) +Signed-off-by: Pawe?? Gronowski <pawel.gronow...@docker.com> +origin: https://github.com/moby/moby/commit/88c4b7690840044ce15489699294ec7c5dadf5dd +debian-bug: https://bugs.debian.org/1084993 +bug: https://github.com/moby/moby/security/advisories/GHSA-v23v-6jw2-98fq +--- + pkg/authorization/authz.go | 38 ++++++++++++++++++--- + pkg/authorization/authz_unix_test.go | 49 ++++++++++++++++++++++++++-- + 2 files changed, 80 insertions(+), 7 deletions(-) + +diff --git a/pkg/authorization/authz.go b/pkg/authorization/authz.go +index 590ac8dddd883..da748865dd9e2 100644 +--- a/engine/pkg/authorization/authz.go ++++ b/engine/pkg/authorization/authz.go +@@ -7,6 +7,8 @@ import ( + "io" + "mime" + "net/http" ++ "net/url" ++ "regexp" + "strings" + + "github.com/docker/docker/pkg/ioutils" +@@ -52,10 +54,23 @@ type Ctx struct { + authReq *Request + } + ++func isChunked(r *http.Request) bool { ++ // RFC 7230 specifies that content length is to be ignored if Transfer-Encoding is chunked ++ if strings.ToLower(r.Header.Get("Transfer-Encoding")) == "chunked" { ++ return true ++ } ++ for _, v := range r.TransferEncoding { ++ if 0 == strings.Compare(strings.ToLower(v), "chunked") { ++ return true ++ } ++ } ++ return false ++} ++ + // AuthZRequest authorized the request to the docker daemon using authZ plugins + func (ctx *Ctx) AuthZRequest(w http.ResponseWriter, r *http.Request) error { + var body []byte +- if sendBody(ctx.requestURI, r.Header) && r.ContentLength > 0 && r.ContentLength < maxBodySize { ++ if sendBody(ctx.requestURI, r.Header) && (r.ContentLength > 0 || isChunked(r)) && r.ContentLength < maxBodySize { + var err error + body, r.Body, err = drainBody(r.Body) + if err != nil { +@@ -108,7 +123,6 @@ func (ctx *Ctx) AuthZResponse(rm ResponseModifier, r *http.Request) error { + if sendBody(ctx.requestURI, rm.Header()) { + ctx.authReq.ResponseBody = rm.RawBody() + } +- + for _, plugin := range ctx.plugins { + logrus.Debugf("AuthZ response using plugin %s", plugin.Name()) + +@@ -146,10 +160,26 @@ func drainBody(body io.ReadCloser) ([]byte, io.ReadCloser, error) { + return nil, newBody, err + } + ++func isAuthEndpoint(urlPath string) (bool, error) { ++ // eg www.test.com/v1.24/auth/optional?optional1=something&optional2=something (version optional) ++ matched, err := regexp.MatchString(`^[^\/]+\/(v\d[\d\.]*\/)?auth.*`, urlPath) ++ if err != nil { ++ return false, err ++ } ++ return matched, nil ++} ++ + // sendBody returns true when request/response body should be sent to AuthZPlugin +-func sendBody(url string, header http.Header) bool { ++func sendBody(inURL string, header http.Header) bool { ++ u, err := url.Parse(inURL) ++ // Assume no if the URL cannot be parsed - an empty request will still be forwarded to the plugin and should be rejected ++ if err != nil { ++ return false ++ } ++ + // Skip body for auth endpoint +- if strings.HasSuffix(url, "/auth") { ++ isAuth, err := isAuthEndpoint(u.Path) ++ if isAuth || err != nil { + return false + } + +diff --git a/pkg/authorization/authz_unix_test.go b/pkg/authorization/authz_unix_test.go +index 835cb703839be..1fce6d03b76a8 100644 +--- a/engine/pkg/authorization/authz_unix_test.go ++++ b/engine/pkg/authorization/authz_unix_test.go +@@ -175,8 +175,8 @@ func TestDrainBody(t *testing.T) { + + func TestSendBody(t *testing.T) { + var ( +- url = "nothing.com" + testcases = []struct { ++ url string + contentType string + expected bool + }{ +@@ -220,15 +220,58 @@ func TestSendBody(t *testing.T) { + contentType: "", + expected: false, + }, ++ { ++ url: "nothing.com/auth", ++ contentType: "", ++ expected: false, ++ }, ++ { ++ url: "nothing.com/auth", ++ contentType: "application/json;charset=UTF8", ++ expected: false, ++ }, ++ { ++ url: "nothing.com/auth?p1=test", ++ contentType: "application/json;charset=UTF8", ++ expected: false, ++ }, ++ { ++ url: "nothing.com/test?p1=/auth", ++ contentType: "application/json;charset=UTF8", ++ expected: true, ++ }, ++ { ++ url: "nothing.com/something/auth", ++ contentType: "application/json;charset=UTF8", ++ expected: true, ++ }, ++ { ++ url: "nothing.com/auth/test", ++ contentType: "application/json;charset=UTF8", ++ expected: false, ++ }, ++ { ++ url: "nothing.com/v1.24/auth/test", ++ contentType: "application/json;charset=UTF8", ++ expected: false, ++ }, ++ { ++ url: "nothing.com/v1/auth/test", ++ contentType: "application/json;charset=UTF8", ++ expected: false, ++ }, + } + ) + + for _, testcase := range testcases { + header := http.Header{} + header.Set("Content-Type", testcase.contentType) ++ if testcase.url == "" { ++ testcase.url = "nothing.com" ++ } + +- if b := sendBody(url, header); b != testcase.expected { +- t.Fatalf("Unexpected Content-Type; Expected: %t, Actual: %t", testcase.expected, b) ++ if b := sendBody(testcase.url, header); b != testcase.expected { ++ t.Fatalf("sendBody failed: url: %s, content-type: %s; Expected: %t, Actual: %t", testcase.url, testcase.contentType, testcase.expected, b) + } + } + } + diff -Nru docker.io-20.10.24+dfsg1/debian/patches/series docker.io-20.10.24+dfsg1/debian/patches/series --- docker.io-20.10.24+dfsg1/debian/patches/series 2023-01-20 08:06:33.000000000 +0000 +++ docker.io-20.10.24+dfsg1/debian/patches/series 2024-10-12 15:19:49.000000000 +0000 @@ -29,3 +29,4 @@ test--skip-TestGetRootUIDGID.patch test--skip-TestStateRunStop.patch avoid-consul.patch +CVE-2024-41110.patch
signature.asc
Description: This is a digitally signed message part.