From c9da261551bf9e31b151e645a25a032867f3d897 Mon Sep 17 00:00:00 2001 From: Christine Caulfield Date: Fri, 29 Nov 2024 09:50:37 +0000 Subject: [PATCH] Add more validation to ipset names Fixes: RHEL-49565 CVE-2024-41184 --- keepalived.spec | 7 ++- validate-ipset-names-better.patch | 94 +++++++++++++++++++++++++++++++ 2 files changed, 100 insertions(+), 1 deletion(-) create mode 100644 validate-ipset-names-better.patch diff --git a/keepalived.spec b/keepalived.spec index 34728e1..f1e794d 100644 --- a/keepalived.spec +++ b/keepalived.spec @@ -11,13 +11,14 @@ Name: keepalived Summary: High Availability monitor built upon LVS, VRRP and service pollers Version: 2.2.8 -Release: 7%{?dist} +Release: 8%{?dist} License: GPL-2.0-or-later URL: http://www.keepalived.org/ Source0: http://www.keepalived.org/software/keepalived-%{version}.tar.gz Source1: keepalived.service #Patch0: keepalived-configure-c99.patch +Patch1: validate-ipset-names-better.patch Requires(post): systemd Requires(preun): systemd @@ -113,6 +114,10 @@ mkdir -p %{buildroot}%{_libexecdir}/keepalived %{_mandir}/man8/keepalived.8* %changelog +* Fri Nov 29 2024 Christine Caulfield - 2.2.8-8 +- Fix name parsing for CVE-2024-41184 + Resolves: RHEL-49565 + * Tue Oct 29 2024 Troy Dawson - 2.2.8-7 - Bump release for October 2024 mass rebuild: Resolves: RHEL-64018 diff --git a/validate-ipset-names-better.patch b/validate-ipset-names-better.patch new file mode 100644 index 0000000..d38dcfc --- /dev/null +++ b/validate-ipset-names-better.patch @@ -0,0 +1,94 @@ +Version of this patch from upstream + +--- keepalived-2.2.8/keepalived/core/commit e78513fe0ce5d83c226ea2c0bd222f375c2438e7 +Author: Quentin Armitage +Date: Fri Jul 12 15:16:47 2024 +0100 + + vrrp: Handle empty ipset names with vrrp_ipsets keyword + + We now handle empty ipset names and return a config error. + + Signed-off-by: Quentin Armitage + + +global_parser.c 2023-04-01 18:39:25.000000000 +0100 ++++ keepalived-2.2.8.patched/keepalived/core/global_parser.c 2024-11-28 08:56:17.445615602 +0000 +@@ -1086,6 +1086,22 @@ + } + } + #ifdef _HAVE_LIBIPSET_ ++static bool ++check_valid_ipset_name(const vector_t *strvec, unsigned entry, const char *log_name) ++{ ++ if (strlen(strvec_slot(strvec, entry)) >= IPSET_MAXNAMELEN - 1) { ++ report_config_error(CONFIG_GENERAL_ERROR, "VRRP Error : ipset %s name too long - ignored", log_name); ++ return false; ++ } ++ ++ if (strlen(strvec_slot(strvec, entry)) == 0) { ++ report_config_error(CONFIG_GENERAL_ERROR, "VRRP Error : ipset %s name empty - ignored", log_name); ++ return false; ++ } ++ ++ return true; ++} ++ + static void + vrrp_ipsets_handler(const vector_t *strvec) + { +@@ -1103,17 +1119,13 @@ + return; + } + +- if (strlen(strvec_slot(strvec,1)) >= IPSET_MAXNAMELEN - 1) { +- report_config_error(CONFIG_GENERAL_ERROR, "VRRP Error : ipset address name too long - ignored"); ++ if (!check_valid_ipset_name(strvec, 1, "address")) + return; +- } + global_data->vrrp_ipset_address = STRDUP(strvec_slot(strvec,1)); + + if (vector_size(strvec) >= 3) { +- if (strlen(strvec_slot(strvec,2)) >= IPSET_MAXNAMELEN - 1) { +- report_config_error(CONFIG_GENERAL_ERROR, "VRRP Error : ipset IPv6 address name too long - ignored"); ++ if (!check_valid_ipset_name(strvec, 2, "IPv6 address")) + return; +- } + global_data->vrrp_ipset_address6 = STRDUP(strvec_slot(strvec,2)); + } + else { +@@ -1124,10 +1136,8 @@ + global_data->vrrp_ipset_address6 = STRDUP(set_name); + } + if (vector_size(strvec) >= 4) { +- if (strlen(strvec_slot(strvec,3)) >= IPSET_MAXNAMELEN - 1) { +- report_config_error(CONFIG_GENERAL_ERROR, "VRRP Error : ipset IPv6 address_iface name too long - ignored"); ++ if (!check_valid_ipset_name(strvec, 3, "IPv6 address_iface")) + return; +- } + global_data->vrrp_ipset_address_iface6 = STRDUP(strvec_slot(strvec,3)); + } + else { +@@ -1142,10 +1152,8 @@ + } + + if (vector_size(strvec) >= 5) { +- if (strlen(strvec_slot(strvec,4)) >= IPSET_MAXNAMELEN - 1) { +- report_config_error(CONFIG_GENERAL_ERROR, "VRRP Error : ipset IGMP name too long - ignored"); ++ if (!check_valid_ipset_name(strvec, 4, "IGMP")) + return; +- } + global_data->vrrp_ipset_igmp = STRDUP(strvec_slot(strvec,4)); + } + else { +@@ -1156,10 +1164,8 @@ + global_data->vrrp_ipset_igmp = STRDUP(set_name); + } + if (vector_size(strvec) >= 6) { +- if (strlen(strvec_slot(strvec,5)) >= IPSET_MAXNAMELEN - 1) { +- report_config_error(CONFIG_GENERAL_ERROR, "VRRP Error : ipset MLD name too long - ignored"); ++ if (!check_valid_ipset_name(strvec, 5, "MLD")) + return; +- } + global_data->vrrp_ipset_mld = STRDUP(strvec_slot(strvec,5)); + } + else {