Subject:
   Re: [meta-secure-core][PATCH 1/1] libpam: fix CVE-2022-28321

but,  this recipe is in oe-core.

Please ignore this CVE fix as well.

Archana is learning how all these layers work.

../Randy


On 2022-10-28 12:49, Archana Polampalli wrote:
The Linux-PAM package before 1.5.2-6.1 for openSUSE Tumbleweed allows
authentication bypass for SSH logins. The pam_access.so module doesn't
correctly restrict login if a user tries to connect from an IP address
that is not resolvable via DNS. In such conditions, a user with denied
access to a machine can still get access. NOTE: the relevance of this
issue is largely limited to openSUSE Tumbleweed and openSUSE Factory;
it does not affect Linux-PAM upstream.

References:
https://nvd.nist.gov/vuln/detail/CVE-2022-28321

Upstream patches:
https://github.com/linux-pam/linux-pam/commit/08992030c56c940c0707ccbc442b1c325aa01e6d
https://github.com/linux-pam/linux-pam/commit/23393bef92c1e768eda329813d7af55481c6ca9f

Signed-off-by: Archana Polampalli <archana.polampa...@windriver.com>
---
  .../pam/libpam/CVE-2022-28321-0002.patch      | 205 ++++++++++++++++++
  meta/recipes-extended/pam/libpam_1.5.2.bb     |   1 +
  2 files changed, 206 insertions(+)
  create mode 100644 meta/recipes-extended/pam/libpam/CVE-2022-28321-0002.patch

diff --git a/meta/recipes-extended/pam/libpam/CVE-2022-28321-0002.patch 
b/meta/recipes-extended/pam/libpam/CVE-2022-28321-0002.patch
new file mode 100644
index 0000000000..e7bf03f9f7
--- /dev/null
+++ b/meta/recipes-extended/pam/libpam/CVE-2022-28321-0002.patch
@@ -0,0 +1,205 @@
+From 23393bef92c1e768eda329813d7af55481c6ca9f Mon Sep 17 00:00:00 2001
+From: Thorsten Kukuk <ku...@suse.com>
+Date: Thu, 24 Feb 2022 10:37:32 +0100
+Subject: [PATCH 2/2] pam_access: handle hostnames in access.conf
+
+According to the manual page, the following entry is valid but does not
+work:
+-:root:ALL EXCEPT localhost
+
+See https://bugzilla.suse.com/show_bug.cgi?id=1019866
+
+Patched is based on PR#226 from Josef Moellers
+
+Upstream-Status: Backport
+CVE: CVE-2022-28321
+
+Reference to upstream patch:
+[https://github.com/linux-pam/linux-pam/commit/23393bef92c1e768eda329813d7af55481c6ca9f]
+
+Signed-off-by: Stefan Ghinea <stefan.ghi...@windriver.com>
+---
+ modules/pam_access/pam_access.c | 95 ++++++++++++++++++++++++++-------
+ 1 file changed, 76 insertions(+), 19 deletions(-)
+
+diff --git a/modules/pam_access/pam_access.c b/modules/pam_access/pam_access.c
+index 277192b..bca424f 100644
+--- a/modules/pam_access/pam_access.c
++++ b/modules/pam_access/pam_access.c
+@@ -637,7 +637,7 @@ remote_match (pam_handle_t *pamh, char *tok, struct 
login_info *item)
+       if ((str_len = strlen(string)) > tok_len
+         && strcasecmp(tok, string + str_len - tok_len) == 0)
+       return YES;
+-    } else if (tok[tok_len - 1] == '.') {
++    } else if (tok[tok_len - 1] == '.') {       /* internet network numbers (end with 
".") */
+       struct addrinfo hint;
+
+       memset (&hint, '\0', sizeof (hint));
+@@ -678,7 +678,7 @@ remote_match (pam_handle_t *pamh, char *tok, struct 
login_info *item)
+       return NO;
+     }
+
+-    /* Assume network/netmask with an IP of a host.  */
++    /* Assume network/netmask, IP address or hostname.  */
+     return network_netmask_match(pamh, tok, string, item);
+ }
+
+@@ -696,7 +696,7 @@ string_match (pam_handle_t *pamh, const char *tok, const 
char *string,
+     /*
+      * If the token has the magic value "ALL" the match always succeeds.
+      * Otherwise, return YES if the token fully matches the string.
+-       * "NONE" token matches NULL string.
++     * "NONE" token matches NULL string.
+      */
+
+     if (strcasecmp(tok, "ALL") == 0) {              /* all: always matches */
+@@ -714,7 +714,8 @@ string_match (pam_handle_t *pamh, const char *tok, const 
char *string,
+
+ /* network_netmask_match - match a string against one token
+  * where string is a hostname or ip (v4,v6) address and tok
+- * represents either a single ip (v4,v6) address or a network/netmask
++ * represents either a hostname, a single ip (v4,v6) address
++ * or a network/netmask
+  */
+ static int
+ network_netmask_match (pam_handle_t *pamh,
+@@ -723,10 +724,12 @@ network_netmask_match (pam_handle_t *pamh,
+     char *netmask_ptr;
+     char netmask_string[MAXHOSTNAMELEN + 1];
+     int addr_type;
++    struct addrinfo *ai = NULL;
+
+     if (item->debug)
+-    pam_syslog (pamh, LOG_DEBUG,
++      pam_syslog (pamh, LOG_DEBUG,
+               "network_netmask_match: tok=%s, item=%s", tok, string);
++
+     /* OK, check if tok is of type addr/mask */
+     if ((netmask_ptr = strchr(tok, '/')) != NULL)
+       {
+@@ -760,54 +763,108 @@ network_netmask_match (pam_handle_t *pamh,
+           netmask_ptr = number_to_netmask(netmask, addr_type,
+               netmask_string, MAXHOSTNAMELEN);
+         }
+-      }
++
++        /*
++         * Construct an addrinfo list from the IP address.
++         * This should not fail as the input is a correct IP address...
++         */
++      if (getaddrinfo (tok, NULL, NULL, &ai) != 0)
++        {
++          return NO;
++        }
++      }
+     else
+-      /* NO, then check if it is only an addr */
+-      if (isipaddr(tok, NULL, NULL) != YES)
++      {
++        /*
++       * It is either an IP address or a hostname.
++       * Let getaddrinfo sort everything out
++       */
++      if (getaddrinfo (tok, NULL, NULL, &ai) != 0)
+         {
++          pam_syslog(pamh, LOG_ERR, "cannot resolve hostname \"%s\"", tok);
++
+           return NO;
+         }
++      netmask_ptr = NULL;
++      }
+
+     if (isipaddr(string, NULL, NULL) != YES)
+       {
+-      /* Assume network/netmask with a name of a host.  */
+       struct addrinfo hint;
+
++      /* Assume network/netmask with a name of a host.  */
+       memset (&hint, '\0', sizeof (hint));
+       hint.ai_flags = AI_CANONNAME;
+       hint.ai_family = AF_UNSPEC;
+
+       if (item->gai_rv != 0)
++        {
++          freeaddrinfo(ai);
+           return NO;
++        }
+       else if (!item->res &&
+               (item->gai_rv = getaddrinfo (string, NULL, &hint, &item->res)) 
!= 0)
++        {
++          freeaddrinfo(ai);
+           return NO;
++        }
+         else
+         {
+           struct addrinfo *runp = item->res;
++          struct addrinfo *runp1;
+
+           while (runp != NULL)
+             {
+               char buf[INET6_ADDRSTRLEN];
+
+-              DIAG_PUSH_IGNORE_CAST_ALIGN;
+-              inet_ntop (runp->ai_family,
+-                      runp->ai_family == AF_INET
+-                      ? (void *) &((struct sockaddr_in *) 
runp->ai_addr)->sin_addr
+-                      : (void *) &((struct sockaddr_in6 *) 
runp->ai_addr)->sin6_addr,
+-                      buf, sizeof (buf));
+-              DIAG_POP_IGNORE_CAST_ALIGN;
++              if (getnameinfo (runp->ai_addr, runp->ai_addrlen, buf, sizeof 
(buf), NULL, 0, NI_NUMERICHOST) != 0)
++                {
++                  freeaddrinfo(ai);
++                  return NO;
++                }
+
+-              if (are_addresses_equal(buf, tok, netmask_ptr))
++              for (runp1 = ai; runp1 != NULL; runp1 = runp1->ai_next)
+                 {
+-                  return YES;
++                    char buf1[INET6_ADDRSTRLEN];
++
++                    if (runp->ai_family != runp1->ai_family)
++                      continue;
++
++                    if (getnameinfo (runp1->ai_addr, runp1->ai_addrlen, buf1, 
sizeof (buf1), NULL, 0, NI_NUMERICHOST) != 0)
++                    {
++                      freeaddrinfo(ai);
++                      return NO;
++                    }
++
++                    if (are_addresses_equal (buf, buf1, netmask_ptr))
++                      {
++                        freeaddrinfo(ai);
++                        return YES;
++                      }
+                 }
+               runp = runp->ai_next;
+             }
+         }
+       }
+     else
+-      return (are_addresses_equal(string, tok, netmask_ptr));
++      {
++       struct addrinfo *runp1;
++
++       for (runp1 = ai; runp1 != NULL; runp1 = runp1->ai_next)
++         {
++           char buf1[INET6_ADDRSTRLEN];
++
++           (void) getnameinfo (runp1->ai_addr, runp1->ai_addrlen, buf1, 
sizeof (buf1), NULL, 0, NI_NUMERICHOST);
++
++           if (are_addresses_equal(string, buf1, netmask_ptr))
++             {
++               freeaddrinfo(ai);
++               return YES;
++             }
++         }
++      }
++
++  freeaddrinfo(ai);
+
+   return NO;
+ }
+--
+2.37.3
+
diff --git a/meta/recipes-extended/pam/libpam_1.5.2.bb 
b/meta/recipes-extended/pam/libpam_1.5.2.bb
index 081986ef43..dabd3256c8 100644
--- a/meta/recipes-extended/pam/libpam_1.5.2.bb
+++ b/meta/recipes-extended/pam/libpam_1.5.2.bb
@@ -24,6 +24,7 @@ SRC_URI = 
"https://github.com/linux-pam/linux-pam/releases/download/v${PV}/Linux
             file://0001-run-xtests.sh-check-whether-files-exist.patch \
             file://run-ptest \
             file://pam-volatiles.conf \
+           file://CVE-2022-28321-0002.patch \
             "
SRC_URI[sha256sum] = "e4ec7131a91da44512574268f493c6d8ca105c87091691b8e9b56ca685d4f94d"


--
# Randy MacLeod
# Wind River Linux

-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#172276): 
https://lists.openembedded.org/g/openembedded-core/message/172276
Mute This Topic: https://lists.openembedded.org/mt/94632216/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to