• E
    security: provide supplemental groups even when parsing label (CVE-2013-4291) · 745aa55f
    Eric Blake 提交于
    Commit 29fe5d74 (released in 1.1.1) introduced a latent problem
    for any caller of virSecurityManagerSetProcessLabel and where
    the domain already had a uid:gid label to be parsed.  Such a
    setup would collect the list of supplementary groups during
    virSecurityManagerPreFork, but then ignores that information,
    and thus fails to call setgroups() to adjust the supplementary
    groups of the process.
    
    Upstream does not use virSecurityManagerSetProcessLabel for
    qemu (it uses virSecurityManagerSetChildProcessLabel instead),
    so this problem remained latent until backporting the initial
    commit into v0.10.2-maint (commit c061ff5e, released in 0.10.2.7),
    where virSecurityManagerSetChildProcessLabel has not been
    backported.  As a result of using a different code path in the
    backport, attempts to start a qemu domain that runs as qemu:qemu
    will end up with supplementary groups unchanged from the libvirtd
    parent process, rather than the desired supplementary groups of
    the qemu user.  This can lead to failure to start a domain
    (typical Fedora setup assigns user 107 'qemu' to both group 107
    'qemu' and group 36 'kvm', so a disk image that is only readable
    under kvm group rights is locked out).  Worse, it is a security
    hole (the qemu process will inherit supplemental group rights
    from the parent libvirtd process, which means it has access
    rights to files owned by group 0 even when such files should
    not normally be visible to user qemu).
    
    LXC does not use the DAC security driver, so it is not vulnerable
    at this time.  Still, it is better to plug the latent hole on
    the master branch first, before cherry-picking it to the only
    vulnerable branch v0.10.2-maint.
    
    * src/security/security_dac.c (virSecurityDACGetIds): Always populate
    groups and ngroups, rather than only when no label is parsed.
    Signed-off-by: NEric Blake <eblake@redhat.com>
    745aa55f
security_dac.c 34.5 KB