forked from rpms/glibc
75c69240a7
This is an automated DistroBaker update from upstream sources. If you do not know what this is about or would like to opt out, contact the OSCI team. Source: https://src.fedoraproject.org/rpms/glibc.git#51d2a6494c93b5cab0efacdbab8f272589214446
166 lines
4.8 KiB
Diff
166 lines
4.8 KiB
Diff
commit 3e880d733753183696d1a81c34caef3a9add2b0c
|
|
Author: DJ Delorie <dj@redhat.com>
|
|
Date: Thu Feb 18 15:26:30 2021 -0500
|
|
|
|
nss: Re-enable NSS module loading after chroot [BZ #27389]
|
|
|
|
The glibc 2.33 release enabled /etc/nsswitch.conf reloading,
|
|
and to prevent potential security issues like CVE-2019-14271
|
|
the re-loading of nsswitch.conf and all mdoules was disabled
|
|
when the root filesystem changes (see bug 27077).
|
|
|
|
Unfortunately php-lpfm and openldap both require the ability
|
|
to continue to load NSS modules after chroot. The packages
|
|
do not exec after the chroot, and so do not cause the
|
|
protections to be reset. The only solution is to re-enable
|
|
only NSS module loading (not nsswitch.conf reloading) and so
|
|
get back the previous glibc behaviour.
|
|
|
|
In the future we may introduce a way to harden applications
|
|
so they do not reload NSS modules once the root filesystem
|
|
changes, or that only files/dns are available pre-loaded
|
|
(or builtin).
|
|
|
|
Reviewed-by: Carlos O'Donell <carlos@redhat.com>
|
|
(cherry picked from commit 58673149f37389495c098421085ffdb468b3f7ad)
|
|
|
|
diff --git a/nss/nss_database.c b/nss/nss_database.c
|
|
index e1bef6bd75ce0160..fb72d0cc03d5c0c8 100644
|
|
--- a/nss/nss_database.c
|
|
+++ b/nss/nss_database.c
|
|
@@ -402,7 +402,6 @@ nss_database_check_reload_and_get (struct nss_database_state *local,
|
|
atomic_store_release (&local->data.reload_disabled, 1);
|
|
*result = local->data.services[database_index];
|
|
__libc_lock_unlock (local->lock);
|
|
- __nss_module_disable_loading ();
|
|
return true;
|
|
}
|
|
local->root_ino = str.st_ino;
|
|
diff --git a/nss/tst-reload2.c b/nss/tst-reload2.c
|
|
index 5dae16b4f05096e8..5ecb032e9fcd6868 100644
|
|
--- a/nss/tst-reload2.c
|
|
+++ b/nss/tst-reload2.c
|
|
@@ -26,6 +26,7 @@
|
|
#include <pwd.h>
|
|
#include <grp.h>
|
|
#include <unistd.h>
|
|
+#include <netdb.h>
|
|
|
|
#include <support/support.h>
|
|
#include <support/check.h>
|
|
@@ -48,7 +49,7 @@ static const char *group_4[] = {
|
|
"alpha", "beta", "gamma", "fred", NULL
|
|
};
|
|
|
|
-static struct group group_table_data[] =
|
|
+static struct group group_table_data1[] =
|
|
{
|
|
GRP (4),
|
|
GRP_LAST ()
|
|
@@ -58,7 +59,7 @@ void
|
|
_nss_test1_init_hook (test_tables *t)
|
|
{
|
|
t->pwd_table = pwd_table1;
|
|
- t->grp_table = group_table_data;
|
|
+ t->grp_table = group_table_data1;
|
|
}
|
|
|
|
static struct passwd pwd_table2[] =
|
|
@@ -68,10 +69,21 @@ static struct passwd pwd_table2[] =
|
|
PWD_LAST ()
|
|
};
|
|
|
|
+static const char *group_5[] = {
|
|
+ "fred", NULL
|
|
+};
|
|
+
|
|
+static struct group group_table_data2[] =
|
|
+ {
|
|
+ GRP (5),
|
|
+ GRP_LAST ()
|
|
+ };
|
|
+
|
|
void
|
|
_nss_test2_init_hook (test_tables *t)
|
|
{
|
|
t->pwd_table = pwd_table2;
|
|
+ t->grp_table = group_table_data2;
|
|
}
|
|
|
|
static int
|
|
@@ -79,6 +91,7 @@ do_test (void)
|
|
{
|
|
struct passwd *pw;
|
|
struct group *gr;
|
|
+ struct hostent *he;
|
|
char buf1[PATH_MAX];
|
|
char buf2[PATH_MAX];
|
|
|
|
@@ -99,7 +112,9 @@ do_test (void)
|
|
TEST_COMPARE (pw->pw_uid, 1234);
|
|
|
|
/* This just loads the test2 DSO. */
|
|
- gr = getgrnam ("name4");
|
|
+ gr = getgrgid (5);
|
|
+ TEST_VERIFY (gr != NULL);
|
|
+
|
|
|
|
/* Change the root dir. */
|
|
|
|
@@ -114,15 +129,21 @@ do_test (void)
|
|
if (pw)
|
|
TEST_VERIFY (pw->pw_uid != 2468);
|
|
|
|
- /* The "files" DSO should not be loaded. */
|
|
- gr = getgrnam ("test3");
|
|
- TEST_VERIFY (gr == NULL);
|
|
-
|
|
/* We should still be using the old configuration. */
|
|
pw = getpwnam ("test1");
|
|
TEST_VERIFY (pw != NULL);
|
|
if (pw)
|
|
TEST_COMPARE (pw->pw_uid, 1234);
|
|
+ gr = getgrgid (5);
|
|
+ TEST_VERIFY (gr != NULL);
|
|
+ gr = getgrnam ("name4");
|
|
+ TEST_VERIFY (gr == NULL);
|
|
+
|
|
+ /* hosts in the outer nsswitch is files; the inner one is test1.
|
|
+ Verify that we're still using the outer nsswitch *and* that we
|
|
+ can load the files DSO. */
|
|
+ he = gethostbyname ("test2");
|
|
+ TEST_VERIFY (he != NULL);
|
|
|
|
return 0;
|
|
}
|
|
diff --git a/nss/tst-reload2.root/etc/hosts b/nss/tst-reload2.root/etc/hosts
|
|
new file mode 100644
|
|
index 0000000000000000..bbd9e494ef39acc8
|
|
--- /dev/null
|
|
+++ b/nss/tst-reload2.root/etc/hosts
|
|
@@ -0,0 +1 @@
|
|
+1.2.3.4 test1
|
|
diff --git a/nss/tst-reload2.root/etc/nsswitch.conf b/nss/tst-reload2.root/etc/nsswitch.conf
|
|
index 570795ae22d116f1..688a5895191a913b 100644
|
|
--- a/nss/tst-reload2.root/etc/nsswitch.conf
|
|
+++ b/nss/tst-reload2.root/etc/nsswitch.conf
|
|
@@ -1,2 +1,3 @@
|
|
passwd: test1
|
|
group: test2
|
|
+hosts: files
|
|
diff --git a/nss/tst-reload2.root/subdir/etc/hosts b/nss/tst-reload2.root/subdir/etc/hosts
|
|
new file mode 100644
|
|
index 0000000000000000..0a2cbd4337f80bc3
|
|
--- /dev/null
|
|
+++ b/nss/tst-reload2.root/subdir/etc/hosts
|
|
@@ -0,0 +1 @@
|
|
+1.2.3.4 test2
|
|
diff --git a/nss/tst-reload2.root/subdir/etc/nsswitch.conf b/nss/tst-reload2.root/subdir/etc/nsswitch.conf
|
|
index f1d73f8765116d1d..fea271869ef98458 100644
|
|
--- a/nss/tst-reload2.root/subdir/etc/nsswitch.conf
|
|
+++ b/nss/tst-reload2.root/subdir/etc/nsswitch.conf
|
|
@@ -1,2 +1,3 @@
|
|
passwd: test2
|
|
group: files
|
|
+hosts: test1
|