Skip to content

Commit

Permalink
Browse files Browse the repository at this point in the history
  • Loading branch information
gshanbhag525 committed Jan 30, 2025
1 parent 478bfb5 commit baef1ad
Showing 1 changed file with 13 additions and 7 deletions.
Original file line number Diff line number Diff line change
@@ -1,12 +1,16 @@
{
"schema_version": "1.4.0",
"id": "GHSA-x9qq-236j-gj97",
"modified": "2024-03-05T15:26:23Z",
"modified": "2024-03-05T15:26:24Z",
"published": "2023-12-05T23:32:58Z",
"aliases": [],
"aliases": [

],
"summary": "Canonical LXD documentation improvement to make clear restricted.devices.disk=allow without restricted.devices.disk.paths also allows shift=true",
"details": "### Summary\n\nIf a user has restricted access to a project that is configured with `restricted=true`, they can gain root access on the system by creating a disk device with `shift=true` and creating a setuid root executable. This is possible because the `shift` property is not restricted unless `restricted.devices.disk.paths` is set.\n\n### Details\n\nThe following patch shows the offending code with a possible fix:\n```patch\n--- a/lxd/device/disk.go\n+++ b/lxd/device/disk.go\n@@ -429,17 +429,19 @@ func (d *disk) validateEnvironmentSourcePath() error {\n if instProject.Name != api.ProjectDefaultName {\n // If restricted disk paths are in force, then check the disk's source is allowed, and record the\n // allowed parent path for later user during device start up sequence.\n- if shared.IsTrue(instProject.Config[\"restricted\"]) && instProject.Config[\"restricted.devices.disk.paths\"] != \"\" {\n- allowed, restrictedParentSourcePath := project.CheckRestrictedDevicesDiskPaths(instProject.Config, d.config[\"source\"])\n- if !allowed {\n- return fmt.Errorf(\"Disk source path %q not allowed by project for disk %q\", d.config[\"source\"], d.name)\n+ if shared.IsTrue(instProject.Config[\"restricted\"]) {\n+ if instProject.Config[\"restricted.devices.disk.paths\"] != \"\" {\n+ allowed, restrictedParentSourcePath := project.CheckRestrictedDevicesDiskPaths(instProject.Config, d.config[\"source\"])\n+ if !allowed {\n+ return fmt.Errorf(\"Disk source path %q not allowed by project for disk %q\", d.config[\"source\"], d.name)\n+ }\n+\n+ d.restrictedParentSourcePath = shared.HostPath(restrictedParentSourcePath)\n }\n\n if shared.IsTrue(d.config[\"shift\"]) {\n return fmt.Errorf(`The \"shift\" property cannot be used with a restricted source path`)\n }\n-\n- d.restrictedParentSourcePath = shared.HostPath(restrictedParentSourcePath)\n }\n }\n```\n\n### PoC\n\n```bash\n$ lxc project create restricted -c restricted=true -c restricted.devices.disk=allow\n$ lxc project switch restricted\n$ lxc profile device add default root disk path=/ pool=default\n$ lxc init ubuntu:22.04 c1\n$ lxc config device add c1 d1 disk source=/ path=/mnt shift=true\n$ lxc start c1 # no error\n\n$ lxc project set restricted restricted.devices.disk.paths=/ # explicitly allow mounting /\n$ lxc restart c1\nError: Failed to start device \"d1\": The \"shift\" property cannot be used with a restricted source path\n```\n\nCreated https://github.com/canonical/lxd/issues/12606 to improve the documentation as per https://github.com/canonical/lxd/security/advisories/GHSA-x9qq-236j-gj97#advisory-comment-91918",
"severity": [],
"severity": [

],
"affected": [
{
"package": {
Expand All @@ -18,16 +22,16 @@
"type": "ECOSYSTEM",
"events": [
{
"introduced": "5.19"
"introduced": "0.0.0-20231019094722-ff5926c3b519"
},
{
"fixed": "5.20"
"fixed": "= 0.0.0-20231212113931-6b2c9592e968"
}
]
}
],
"versions": [
"5.19"
"0.0.0-20231019094722-ff5926c3b519"
]
}
],
Expand All @@ -50,7 +54,9 @@
}
],
"database_specific": {
"cwe_ids": [],
"cwe_ids": [

],
"severity": "LOW",
"github_reviewed": true,
"github_reviewed_at": "2023-12-05T23:32:58Z",
Expand Down

0 comments on commit baef1ad

Please sign in to comment.