!42 [sync] PR-41: fix CVE-2022-31030
### 1. Origin pull request:
https://gitee.com/src-openeuler/containerd/pulls/41
### 2. Original pull request related issue(s):
https://gitee.com/src-openeuler/containerd/issues/I5BLIU
### 3. Original pull request related commit(s):
| Sha | Datetime | Message |
|---|---|---|
|[0436d058](0436d058b3)|2022-07-04 17:06:29 +0800 CST|containerd: Limit the response size of ExecSync<br><br>fix CVE-2022-31030<br><br>Signed-off-by: zhongjiawei <zhongjiawei1@huawei.com><br>|
From: @openeuler-sync-bot
Reviewed-by: @zhangsong234, @duguhaotian
Signed-off-by: @duguhaotian
This commit is contained in:
commit
8f8cc81338
@ -2,7 +2,7 @@
|
|||||||
%global debug_package %{nil}
|
%global debug_package %{nil}
|
||||||
Version: 1.2.0
|
Version: 1.2.0
|
||||||
Name: containerd
|
Name: containerd
|
||||||
Release: 302
|
Release: 303
|
||||||
Summary: An industry-standard container runtime
|
Summary: An industry-standard container runtime
|
||||||
License: ASL 2.0
|
License: ASL 2.0
|
||||||
URL: https://containerd.io
|
URL: https://containerd.io
|
||||||
@ -52,6 +52,12 @@ install -p -m 755 bin/containerd-shim $RPM_BUILD_ROOT/%{_bindir}/containerd-shim
|
|||||||
%{_bindir}/containerd-shim
|
%{_bindir}/containerd-shim
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Mon Jul 4 2022 zhongjiawei<zhongjiawei1@huawei.com> - 1.2.0-303
|
||||||
|
- Type:bugfix
|
||||||
|
- ID:NA
|
||||||
|
- SUG:NA
|
||||||
|
- DESC: Limit the response size of ExecSync to fix CVE-2022-31030
|
||||||
|
|
||||||
* Wed Jun 22 2022 zhangsong234<zhangsong34@huawei.com> - 1.2.0-302
|
* Wed Jun 22 2022 zhangsong234<zhangsong34@huawei.com> - 1.2.0-302
|
||||||
- Type:bugfix
|
- Type:bugfix
|
||||||
- ID:NA
|
- ID:NA
|
||||||
|
|||||||
@ -1 +1 @@
|
|||||||
755bdc7a74588295ea632aa10da179cbcce8c64f
|
1493659ef0808b8f3a5b920b0f0661833af2782e
|
||||||
|
|||||||
133
patch/0086-containerd-Limit-the-response-size-of-ExecSync.patch
Normal file
133
patch/0086-containerd-Limit-the-response-size-of-ExecSync.patch
Normal file
@ -0,0 +1,133 @@
|
|||||||
|
From cf3bde2b5a78d7ba8773eadcc3b28dfb0001aee0 Mon Sep 17 00:00:00 2001
|
||||||
|
From: zhongjiawei <zhongjiawei1@huawei.com>
|
||||||
|
Date: Mon, 4 Jul 2022 14:34:23 +0800
|
||||||
|
Subject: [PATCH] containerd: Limit the response size of ExecSync
|
||||||
|
|
||||||
|
fix CVE-2022-31030
|
||||||
|
upstream:https://github.com/containerd/containerd/commit/c1bcabb4541930f643aa36a2b38655e131346382
|
||||||
|
---
|
||||||
|
.../cri/pkg/server/container_execsync.go | 45 ++++++++++++++++-
|
||||||
|
.../cri/pkg/server/container_execsync_test.go | 49 +++++++++++++++++++
|
||||||
|
2 files changed, 92 insertions(+), 2 deletions(-)
|
||||||
|
create mode 100644 vendor/github.com/containerd/cri/pkg/server/container_execsync_test.go
|
||||||
|
|
||||||
|
diff --git a/vendor/github.com/containerd/cri/pkg/server/container_execsync.go b/vendor/github.com/containerd/cri/pkg/server/container_execsync.go
|
||||||
|
index fd54120..1ef93e5 100644
|
||||||
|
--- a/vendor/github.com/containerd/cri/pkg/server/container_execsync.go
|
||||||
|
+++ b/vendor/github.com/containerd/cri/pkg/server/container_execsync.go
|
||||||
|
@@ -37,14 +37,55 @@ import (
|
||||||
|
"github.com/containerd/cri/pkg/util"
|
||||||
|
)
|
||||||
|
|
||||||
|
+type cappedWriter struct {
|
||||||
|
+ w io.WriteCloser
|
||||||
|
+ remain int
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
+func (cw *cappedWriter) Write(p []byte) (int, error) {
|
||||||
|
+ if cw.remain <= 0 {
|
||||||
|
+ return len(p), nil
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
+ end := cw.remain
|
||||||
|
+ if end > len(p) {
|
||||||
|
+ end = len(p)
|
||||||
|
+ }
|
||||||
|
+ written, err := cw.w.Write(p[0:end])
|
||||||
|
+ cw.remain -= written
|
||||||
|
+
|
||||||
|
+ if err != nil {
|
||||||
|
+ return written, err
|
||||||
|
+ }
|
||||||
|
+ return len(p), nil
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
+func (cw *cappedWriter) Close() error {
|
||||||
|
+ return cw.w.Close()
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
+func (cw *cappedWriter) isFull() bool {
|
||||||
|
+ return cw.remain <= 0
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
// ExecSync executes a command in the container, and returns the stdout output.
|
||||||
|
// If command exits with a non-zero exit code, an error is returned.
|
||||||
|
func (c *criService) ExecSync(ctx context.Context, r *runtime.ExecSyncRequest) (*runtime.ExecSyncResponse, error) {
|
||||||
|
+ const maxStreamSize = 1024 * 1024 * 16
|
||||||
|
+
|
||||||
|
var stdout, stderr bytes.Buffer
|
||||||
|
+
|
||||||
|
+ // cappedWriter truncates the output. In that case, the size of
|
||||||
|
+ // the ExecSyncResponse will hit the CRI plugin's gRPC response limit.
|
||||||
|
+ // Thus the callers outside of the containerd process (e.g. Kubelet) never see
|
||||||
|
+ // the truncated output.
|
||||||
|
+ cout := &cappedWriter{w: cioutil.NewNopWriteCloser(&stdout), remain: maxStreamSize}
|
||||||
|
+ cerr := &cappedWriter{w: cioutil.NewNopWriteCloser(&stderr), remain: maxStreamSize}
|
||||||
|
+
|
||||||
|
exitCode, err := c.execInContainer(ctx, r.GetContainerId(), execOptions{
|
||||||
|
cmd: r.GetCmd(),
|
||||||
|
- stdout: cioutil.NewNopWriteCloser(&stdout),
|
||||||
|
- stderr: cioutil.NewNopWriteCloser(&stderr),
|
||||||
|
+ stdout: cout,
|
||||||
|
+ stderr: cerr,
|
||||||
|
timeout: time.Duration(r.GetTimeout()) * time.Second,
|
||||||
|
})
|
||||||
|
if err != nil {
|
||||||
|
diff --git a/vendor/github.com/containerd/cri/pkg/server/container_execsync_test.go b/vendor/github.com/containerd/cri/pkg/server/container_execsync_test.go
|
||||||
|
new file mode 100644
|
||||||
|
index 0000000..c8641d0
|
||||||
|
--- /dev/null
|
||||||
|
+++ b/vendor/github.com/containerd/cri/pkg/server/container_execsync_test.go
|
||||||
|
@@ -0,0 +1,49 @@
|
||||||
|
+/*
|
||||||
|
+ Copyright The containerd Authors.
|
||||||
|
+ Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
+ you may not use this file except in compliance with the License.
|
||||||
|
+ You may obtain a copy of the License at
|
||||||
|
+ http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
+ Unless required by applicable law or agreed to in writing, software
|
||||||
|
+ distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
+ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
+ See the License for the specific language governing permissions and
|
||||||
|
+ limitations under the License.
|
||||||
|
+*/
|
||||||
|
+
|
||||||
|
+package server
|
||||||
|
+
|
||||||
|
+import (
|
||||||
|
+ "bytes"
|
||||||
|
+ "testing"
|
||||||
|
+
|
||||||
|
+ cioutil "github.com/containerd/containerd/pkg/ioutil"
|
||||||
|
+ "github.com/stretchr/testify/assert"
|
||||||
|
+)
|
||||||
|
+
|
||||||
|
+func TestCWWrite(t *testing.T) {
|
||||||
|
+ var buf bytes.Buffer
|
||||||
|
+ cw := &cappedWriter{w: cioutil.NewNopWriteCloser(&buf), remain: 10}
|
||||||
|
+
|
||||||
|
+ n, err := cw.Write([]byte("hello"))
|
||||||
|
+ assert.NoError(t, err)
|
||||||
|
+ assert.Equal(t, 5, n)
|
||||||
|
+
|
||||||
|
+ n, err = cw.Write([]byte("helloworld"))
|
||||||
|
+ assert.NoError(t, err, "no errors even it hits the cap")
|
||||||
|
+ assert.Equal(t, 10, n, "no indication of partial write")
|
||||||
|
+ assert.True(t, cw.isFull())
|
||||||
|
+ assert.Equal(t, []byte("hellohello"), buf.Bytes(), "the underlying writer is capped")
|
||||||
|
+
|
||||||
|
+ _, err = cw.Write([]byte("world"))
|
||||||
|
+ assert.NoError(t, err)
|
||||||
|
+ assert.True(t, cw.isFull())
|
||||||
|
+ assert.Equal(t, []byte("hellohello"), buf.Bytes(), "the underlying writer is capped")
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
+func TestCWClose(t *testing.T) {
|
||||||
|
+ var buf bytes.Buffer
|
||||||
|
+ cw := &cappedWriter{w: cioutil.NewNopWriteCloser(&buf), remain: 5}
|
||||||
|
+ err := cw.Close()
|
||||||
|
+ assert.NoError(t, err)
|
||||||
|
+}
|
||||||
|
--
|
||||||
|
2.30.0
|
||||||
|
|
||||||
@ -90,4 +90,5 @@ patch/0082-containerd-fix-publish-command-wait-block-for.patch
|
|||||||
patch/0083-containerd-optimize-cgo-compile-options.patch
|
patch/0083-containerd-optimize-cgo-compile-options.patch
|
||||||
patch/0084-containerd-Use-fs.RootPath-when-mounting-vo.patch
|
patch/0084-containerd-Use-fs.RootPath-when-mounting-vo.patch
|
||||||
patch/0085-containerd-put-get-pid-lock-after-set-process-exited-to-.patch
|
patch/0085-containerd-put-get-pid-lock-after-set-process-exited-to-.patch
|
||||||
|
patch/0086-containerd-Limit-the-response-size-of-ExecSync.patch
|
||||||
# end
|
# end
|
||||||
|
|||||||
Loading…
x
Reference in New Issue
Block a user