From 579c5dc80992ef8dcb92f6a4024d72723b6143b0 Mon Sep 17 00:00:00 2001 From: Fabian Holler Date: Wed, 18 Jan 2023 09:13:50 +0100 Subject: [PATCH] Match VT device paths to be blocked from mounting exactly As @mheon pointed out in PR #17055[^1], isVirtualConsoleDevice() does not only matches VT device paths but also devices named like /dev/tty0abcd. This causes that non VT device paths named /dev/tty[0-9]+[A-Za-z]+ are not mounted into privileged container and systemd containers accidentally. This is an unlikely issue because the Linux kernel does not use device paths like that. To make it failproof and prevent issues in unlikely scenarios, change isVirtualConsoleDevice() to exactly match ^/dev/tty[0-9]+$ paths. Because it is not possible to match this path exactly with Glob syntax, the path is now checked with strings.TrimPrefix() and strconv.ParseUint(). ParseUint uses a bitsize of 16, this is sufficient because the max number of TTY devices is 512 in Linux 6.1.5. (Checked via 'git grep -e '#define' --and -e 'TTY_MINORS'). The commit also adds a unit-test for isVirtualConsoleDevice(). Fixes: f4c81b0aa5fd ("Only prevent VTs to be mounted inside...") [^1]: https://github.com/containers/podman/pull/17055#issuecomment-1378904068 Signed-off-by: Fabian Holler Signed-off-by: Daniel J Walsh --- pkg/util/utils_linux.go | 24 +++++++++------- pkg/util/utils_linux_test.go | 54 ++++++++++++++++++++++++++++++++++++ 2 files changed, 68 insertions(+), 10 deletions(-) create mode 100644 pkg/util/utils_linux_test.go diff --git a/pkg/util/utils_linux.go b/pkg/util/utils_linux.go index e1e87c6d6d..468524405d 100644 --- a/pkg/util/utils_linux.go +++ b/pkg/util/utils_linux.go @@ -5,8 +5,9 @@ import ( "fmt" "io/fs" "os" - "path" "path/filepath" + "strconv" + "strings" "syscall" "github.com/containers/podman/v4/libpod/define" @@ -70,20 +71,23 @@ func FindDeviceNodes() (map[string]string, error) { return nodes, nil } -func isVirtualConsoleDevice(device string) bool { +// isVirtualConsoleDevice returns true if path is a virtual console device +// (/dev/tty\d+). +// The passed path must be clean (filepath.Clean). +func isVirtualConsoleDevice(path string) bool { /* Virtual consoles are of the form `/dev/tty\d+`, any other device such as /dev/tty, ttyUSB0, or ttyACM0 should not be matched. See `man 4 console` for more information. - - NOTE: Matching is done using path.Match even though a regular expression - would have been more accurate. This is because a regular - expression would have required pre-compilation, which would have - increase the startup time needlessly or made the code more complex - than needed. */ - matched, _ := path.Match("/dev/tty[0-9]*", device) - return matched + suffix := strings.TrimPrefix(path, "/dev/tty") + if suffix == path || suffix == "" { + return false + } + + // 16bit because, max. supported TTY devices is 512 in Linux 6.1.5. + _, err := strconv.ParseUint(suffix, 10, 16) + return err == nil } func AddPrivilegedDevices(g *generate.Generator, systemdMode bool) error { diff --git a/pkg/util/utils_linux_test.go b/pkg/util/utils_linux_test.go new file mode 100644 index 0000000000..9d75a20c8f --- /dev/null +++ b/pkg/util/utils_linux_test.go @@ -0,0 +1,54 @@ +package util + +import ( + "testing" +) + +func TestIsVirtualConsoleDevice(t *testing.T) { + testcases := []struct { + expectedResult bool + path string + }{ + { + expectedResult: true, + path: "/dev/tty10", + }, + { + expectedResult: false, + path: "/dev/tty", + }, + { + expectedResult: false, + path: "/dev/ttyUSB0", + }, + { + expectedResult: false, + path: "/dev/tty0abcd", + }, + { + expectedResult: false, + path: "1234", + }, + { + expectedResult: false, + path: "abc", + }, + { + expectedResult: false, + path: " ", + }, + { + expectedResult: false, + path: "", + }, + } + + for _, tc := range testcases { + t.Run(tc.path, func(t *testing.T) { + result := isVirtualConsoleDevice(tc.path) + if result != tc.expectedResult { + t.Errorf("isVirtualConsoleDevice returned %t, expected %t", result, tc.expectedResult) + } + }) + } +}