Skip to content

Commit baef1ad

Browse files
committed
1 parent 478bfb5 commit baef1ad

File tree

1 file changed

+13
-7
lines changed

1 file changed

+13
-7
lines changed

advisories/github-reviewed/2023/12/GHSA-x9qq-236j-gj97/GHSA-x9qq-236j-gj97.json

+13-7
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,16 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-x9qq-236j-gj97",
4-
"modified": "2024-03-05T15:26:23Z",
4+
"modified": "2024-03-05T15:26:24Z",
55
"published": "2023-12-05T23:32:58Z",
6-
"aliases": [],
6+
"aliases": [
7+
8+
],
79
"summary": "Canonical LXD documentation improvement to make clear restricted.devices.disk=allow without restricted.devices.disk.paths also allows shift=true",
810
"details": "### Summary\n\nIf a user has restricted access to a project that is configured with `restricted=true`, they can gain root access on the system by creating a disk device with `shift=true` and creating a setuid root executable. This is possible because the `shift` property is not restricted unless `restricted.devices.disk.paths` is set.\n\n### Details\n\nThe following patch shows the offending code with a possible fix:\n```patch\n--- a/lxd/device/disk.go\n+++ b/lxd/device/disk.go\n@@ -429,17 +429,19 @@ func (d *disk) validateEnvironmentSourcePath() error {\n if instProject.Name != api.ProjectDefaultName {\n // If restricted disk paths are in force, then check the disk's source is allowed, and record the\n // allowed parent path for later user during device start up sequence.\n- if shared.IsTrue(instProject.Config[\"restricted\"]) && instProject.Config[\"restricted.devices.disk.paths\"] != \"\" {\n- allowed, restrictedParentSourcePath := project.CheckRestrictedDevicesDiskPaths(instProject.Config, d.config[\"source\"])\n- if !allowed {\n- return fmt.Errorf(\"Disk source path %q not allowed by project for disk %q\", d.config[\"source\"], d.name)\n+ if shared.IsTrue(instProject.Config[\"restricted\"]) {\n+ if instProject.Config[\"restricted.devices.disk.paths\"] != \"\" {\n+ allowed, restrictedParentSourcePath := project.CheckRestrictedDevicesDiskPaths(instProject.Config, d.config[\"source\"])\n+ if !allowed {\n+ return fmt.Errorf(\"Disk source path %q not allowed by project for disk %q\", d.config[\"source\"], d.name)\n+ }\n+\n+ d.restrictedParentSourcePath = shared.HostPath(restrictedParentSourcePath)\n }\n\n if shared.IsTrue(d.config[\"shift\"]) {\n return fmt.Errorf(`The \"shift\" property cannot be used with a restricted source path`)\n }\n-\n- d.restrictedParentSourcePath = shared.HostPath(restrictedParentSourcePath)\n }\n }\n```\n\n### PoC\n\n```bash\n$ lxc project create restricted -c restricted=true -c restricted.devices.disk=allow\n$ lxc project switch restricted\n$ lxc profile device add default root disk path=/ pool=default\n$ lxc init ubuntu:22.04 c1\n$ lxc config device add c1 d1 disk source=/ path=/mnt shift=true\n$ lxc start c1 # no error\n\n$ lxc project set restricted restricted.devices.disk.paths=/ # explicitly allow mounting /\n$ lxc restart c1\nError: Failed to start device \"d1\": The \"shift\" property cannot be used with a restricted source path\n```\n\nCreated https://github.com/canonical/lxd/issues/12606 to improve the documentation as per https://github.com/canonical/lxd/security/advisories/GHSA-x9qq-236j-gj97#advisory-comment-91918",
9-
"severity": [],
11+
"severity": [
12+
13+
],
1014
"affected": [
1115
{
1216
"package": {
@@ -18,16 +22,16 @@
1822
"type": "ECOSYSTEM",
1923
"events": [
2024
{
21-
"introduced": "5.19"
25+
"introduced": "0.0.0-20231019094722-ff5926c3b519"
2226
},
2327
{
24-
"fixed": "5.20"
28+
"fixed": "= 0.0.0-20231212113931-6b2c9592e968"
2529
}
2630
]
2731
}
2832
],
2933
"versions": [
30-
"5.19"
34+
"0.0.0-20231019094722-ff5926c3b519"
3135
]
3236
}
3337
],
@@ -50,7 +54,9 @@
5054
}
5155
],
5256
"database_specific": {
53-
"cwe_ids": [],
57+
"cwe_ids": [
58+
59+
],
5460
"severity": "LOW",
5561
"github_reviewed": true,
5662
"github_reviewed_at": "2023-12-05T23:32:58Z",

0 commit comments

Comments
 (0)