Blame 0049-virtiofsd-validate-path-components.patch

1d442b
From: Stefan Hajnoczi <stefanha@redhat.com>
1d442b
Date: Mon, 27 Jan 2020 19:01:18 +0000
1d442b
Subject: [PATCH] virtiofsd: validate path components
1d442b
MIME-Version: 1.0
1d442b
Content-Type: text/plain; charset=UTF-8
1d442b
Content-Transfer-Encoding: 8bit
1d442b
1d442b
Several FUSE requests contain single path components.  A correct FUSE
1d442b
client sends well-formed path components but there is currently no input
1d442b
validation in case something went wrong or the client is malicious.
1d442b
1d442b
Refuse ".", "..", and paths containing '/' when we expect a path
1d442b
component.
1d442b
1d442b
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
1d442b
Reviewed-by: Daniel P. Berrangé <berrange@redhat.com>
1d442b
Signed-off-by: Dr. David Alan Gilbert <dgilbert@redhat.com>
1d442b
(cherry picked from commit 25dae28c58d7e706b5d5db99042c9db3cef2e657)
1d442b
---
1d442b
 tools/virtiofsd/passthrough_ll.c | 59 ++++++++++++++++++++++++++++----
1d442b
 1 file changed, 53 insertions(+), 6 deletions(-)
1d442b
1d442b
diff --git a/tools/virtiofsd/passthrough_ll.c b/tools/virtiofsd/passthrough_ll.c
1d442b
index ac380efcb1..e375406160 100644
1d442b
--- a/tools/virtiofsd/passthrough_ll.c
1d442b
+++ b/tools/virtiofsd/passthrough_ll.c
1d442b
@@ -133,6 +133,21 @@ static void unref_inode(struct lo_data *lo, struct lo_inode *inode, uint64_t n);
1d442b
 
1d442b
 static struct lo_inode *lo_find(struct lo_data *lo, struct stat *st);
1d442b
 
1d442b
+static int is_dot_or_dotdot(const char *name)
1d442b
+{
1d442b
+    return name[0] == '.' &&
1d442b
+           (name[1] == '\0' || (name[1] == '.' && name[2] == '\0'));
1d442b
+}
1d442b
+
1d442b
+/* Is `path` a single path component that is not "." or ".."? */
1d442b
+static int is_safe_path_component(const char *path)
1d442b
+{
1d442b
+    if (strchr(path, '/')) {
1d442b
+        return 0;
1d442b
+    }
1d442b
+
1d442b
+    return !is_dot_or_dotdot(path);
1d442b
+}
1d442b
 
1d442b
 static struct lo_data *lo_data(fuse_req_t req)
1d442b
 {
1d442b
@@ -681,6 +696,15 @@ static void lo_lookup(fuse_req_t req, fuse_ino_t parent, const char *name)
1d442b
                  parent, name);
1d442b
     }
1d442b
 
1d442b
+    /*
1d442b
+     * Don't use is_safe_path_component(), allow "." and ".." for NFS export
1d442b
+     * support.
1d442b
+     */
1d442b
+    if (strchr(name, '/')) {
1d442b
+        fuse_reply_err(req, EINVAL);
1d442b
+        return;
1d442b
+    }
1d442b
+
1d442b
     err = lo_do_lookup(req, parent, name, &e);
1d442b
     if (err) {
1d442b
         fuse_reply_err(req, err);
1d442b
@@ -762,6 +786,11 @@ static void lo_mknod_symlink(fuse_req_t req, fuse_ino_t parent,
1d442b
     struct fuse_entry_param e;
1d442b
     struct lo_cred old = {};
1d442b
 
1d442b
+    if (!is_safe_path_component(name)) {
1d442b
+        fuse_reply_err(req, EINVAL);
1d442b
+        return;
1d442b
+    }
1d442b
+
1d442b
     dir = lo_inode(req, parent);
1d442b
     if (!dir) {
1d442b
         fuse_reply_err(req, EBADF);
1d442b
@@ -863,6 +892,11 @@ static void lo_link(fuse_req_t req, fuse_ino_t ino, fuse_ino_t parent,
1d442b
     struct fuse_entry_param e;
1d442b
     int saverr;
1d442b
 
1d442b
+    if (!is_safe_path_component(name)) {
1d442b
+        fuse_reply_err(req, EINVAL);
1d442b
+        return;
1d442b
+    }
1d442b
+
1d442b
     inode = lo_inode(req, ino);
1d442b
     if (!inode) {
1d442b
         fuse_reply_err(req, EBADF);
1d442b
@@ -904,6 +938,10 @@ out_err:
1d442b
 static void lo_rmdir(fuse_req_t req, fuse_ino_t parent, const char *name)
1d442b
 {
1d442b
     int res;
1d442b
+    if (!is_safe_path_component(name)) {
1d442b
+        fuse_reply_err(req, EINVAL);
1d442b
+        return;
1d442b
+    }
1d442b
 
1d442b
     res = unlinkat(lo_fd(req, parent), name, AT_REMOVEDIR);
1d442b
 
1d442b
@@ -916,6 +954,11 @@ static void lo_rename(fuse_req_t req, fuse_ino_t parent, const char *name,
1d442b
 {
1d442b
     int res;
1d442b
 
1d442b
+    if (!is_safe_path_component(name) || !is_safe_path_component(newname)) {
1d442b
+        fuse_reply_err(req, EINVAL);
1d442b
+        return;
1d442b
+    }
1d442b
+
1d442b
     if (flags) {
1d442b
         fuse_reply_err(req, EINVAL);
1d442b
         return;
1d442b
@@ -930,6 +973,11 @@ static void lo_unlink(fuse_req_t req, fuse_ino_t parent, const char *name)
1d442b
 {
1d442b
     int res;
1d442b
 
1d442b
+    if (!is_safe_path_component(name)) {
1d442b
+        fuse_reply_err(req, EINVAL);
1d442b
+        return;
1d442b
+    }
1d442b
+
1d442b
     res = unlinkat(lo_fd(req, parent), name, 0);
1d442b
 
1d442b
     fuse_reply_err(req, res == -1 ? errno : 0);
1d442b
@@ -1093,12 +1141,6 @@ out_err:
1d442b
     fuse_reply_err(req, error);
1d442b
 }
1d442b
 
1d442b
-static int is_dot_or_dotdot(const char *name)
1d442b
-{
1d442b
-    return name[0] == '.' &&
1d442b
-           (name[1] == '\0' || (name[1] == '.' && name[2] == '\0'));
1d442b
-}
1d442b
-
1d442b
 static void lo_do_readdir(fuse_req_t req, fuse_ino_t ino, size_t size,
1d442b
                           off_t offset, struct fuse_file_info *fi, int plus)
1d442b
 {
1d442b
@@ -1248,6 +1290,11 @@ static void lo_create(fuse_req_t req, fuse_ino_t parent, const char *name,
1d442b
                  parent, name);
1d442b
     }
1d442b
 
1d442b
+    if (!is_safe_path_component(name)) {
1d442b
+        fuse_reply_err(req, EINVAL);
1d442b
+        return;
1d442b
+    }
1d442b
+
1d442b
     err = lo_change_cred(req, &old;;
1d442b
     if (err) {
1d442b
         goto out;