git@vger.kernel.org mailing list mirror (one of many)
 help / color / mirror / code / Atom feed
From: "Carlo Marcelo Arenas Belón" <carenas@gmail.com>
To: git@vger.kernel.org
Cc: Johannes.Schindelin@gmx.de, junio@pobox.com
Subject: [PATCH v2] setup: tighten ownership checks post CVE-2022-24765
Date: Wed,  4 May 2022 17:50:09 -0700	[thread overview]
Message-ID: <20220505005009.27789-1-carenas@gmail.com> (raw)
In-Reply-To: <20220504184401.17438-1-carenas@gmail.com>

8959555cee7 (setup_git_directory(): add an owner check for the top-level
directory, 2022-03-02), adds a function to check for ownership of
repositories using a directory that is representative of it (its workdir)
and ways to add it to an exception list if needed, but that check breaks
when the ownership of the workdir is not the same than the ownership of
directory where the configuration and other relevant files reside.

An attacker could create a git repository in a directory that he has write
access to but is owned by the victim, and therefore workaround the fix that
was introduced with CVE-2022-24765 to attack them, like in the following
scenario which could result in privilege escalation if root then runs a git
command in that directory or any of its sub directories:

  $ git -C /tmp init

To avoid that, extend the ensure_valid_ownership function to be able to
check for ownership of both the worktree and the gitdir, and use that for
non bare repositories.

Reported-by: Hanno Böck <hanno@hboeck.de>
Helped-by: Johannes Schindelin <Johannes.Schindelin@gmx.de>
Signed-off-by: Carlo Marcelo Arenas Belón <carenas@gmail.com>
---
Changes since RFC
* remove debug code from ensure_valid_ownership since is no longer needed
* replace convoluted logic in setup_git_directory_gently_1 with Junio's
* improve tests (AGAIN, not considered production and only for convenience)
* hopefully improved commit message and spelling.

The changes in setup.c should be sufficient to cover for all known issues, but
has been only lightly tested and mostly in *NIX, so more changes might be
needed to cover Windows. Specially the use of "/" to reconstruct the gitdir
based on the previously cut workdir might be problematic if not covered by
its compat code.

The code for setup_git_directory_gently_1 is inefficient (as pointed by
dscho) and could be improved by instead reusing the buffer before it is cut
by the setlen, but if doing so, then a copy of the full gitdir will be
needed, so a solution for that is not provided.

In the same line, we already know before getting into the condition, if we
are coming from a gitfile or not, so the is_absolute_path(gitdirenv) could
be optimized away, like it was done in the RFC with an incorrectly named
is_bare boolean, but that change hasn't been implemented as the cost of the
current implementation is unknown and feels like premature optimization.

Slightly off-topic and maybe more of an ADMINISTRATIVE, but had added the
Reported-by for the guy that came with the last report, not sure what the
right procedure is, and might be better if kept as a note, but be careful
of git send-email to avoid leaks, at least until we have a final version.

 setup.c                        | 28 +++++++++++++++++++++++-----
 t/t0034-root-safe-directory.sh | 29 +++++++++++++++++++++++++++++
 2 files changed, 52 insertions(+), 5 deletions(-)

diff --git a/setup.c b/setup.c
index aad9ace0af9..0fae2d71a3c 100644
--- a/setup.c
+++ b/setup.c
@@ -1054,14 +1054,21 @@ static int safe_directory_cb(const char *key, const char *value, void *d)
 	return 0;
 }
 
-static int ensure_valid_ownership(const char *path)
+static int ensure_valid_ownership(const char *worktree, const char *gitdir)
 {
-	struct safe_directory_data data = { .path = path };
+	struct safe_directory_data data = { .path = worktree };
+	const char *check_path;
+
+	if (gitdir)
+		check_path = gitdir;
+	else
+		check_path = worktree;
 
 	if (!git_env_bool("GIT_TEST_ASSUME_DIFFERENT_OWNER", 0) &&
-	    is_path_owned_by_current_user(path))
+	    is_path_owned_by_current_user(check_path))
 		return 1;
 
+	data.is_safe = 0; /* ensure we are initialized and secure by default */
 	read_very_early_config(safe_directory_cb, &data);
 
 	return data.is_safe;
@@ -1166,14 +1173,25 @@ static enum discovery_result setup_git_directory_gently_1(struct strbuf *dir,
 		}
 		strbuf_setlen(dir, offset);
 		if (gitdirenv) {
-			if (!ensure_valid_ownership(dir->buf))
+			const char *gitdir_to_check = gitdirenv;
+			struct strbuf gdbuf = STRBUF_INIT;
+			int ret;
+
+			if (!is_absolute_path(gitdirenv)) {
+				strbuf_addf(&gdbuf, "%s/%s", dir->buf,
+						gitdirenv);
+				gitdir_to_check = gdbuf.buf;
+			}
+			ret = ensure_valid_ownership(dir->buf, gitdir_to_check);
+			strbuf_release(&gdbuf);
+			if (!ret)
 				return GIT_DIR_INVALID_OWNERSHIP;
 			strbuf_addstr(gitdir, gitdirenv);
 			return GIT_DIR_DISCOVERED;
 		}
 
 		if (is_git_directory(dir->buf)) {
-			if (!ensure_valid_ownership(dir->buf))
+			if (!ensure_valid_ownership(NULL, dir->buf))
 				return GIT_DIR_INVALID_OWNERSHIP;
 			strbuf_addstr(gitdir, ".");
 			return GIT_DIR_BARE;
diff --git a/t/t0034-root-safe-directory.sh b/t/t0034-root-safe-directory.sh
index a68e1d7602b..a3ddebb009a 100755
--- a/t/t0034-root-safe-directory.sh
+++ b/t/t0034-root-safe-directory.sh
@@ -47,6 +47,35 @@ test_expect_success SUDO 'sudo git status as original owner' '
 	)
 '
 
+test_expect_success SUDO 'unsecure worktree with non bare repository' '
+	sudo rm -rf root &&
+	sudo mkdir -p root/t &&
+	sudo chmod 1777 root/t &&
+	(
+		cd root/t &&
+		git init &&
+		git status &&
+		sudo git status &&
+		run_with_sudo <<-END
+			unset SUDO_UID &&
+			! git status
+		END
+	)
+'
+
+test_expect_success SUDO 'non bare repository using a gitfile' '
+	sudo rm -rf root &&
+	mkdir -p root/w &&
+	mkdir -p root/e &&
+	(
+		cd root/w &&
+		git init --separate-git-dir ../e &&
+		git status &&
+		sudo chown -R root ../e &&
+		test_must_fail git status
+	)
+'
+
 # this destroys the test environment used above
 test_expect_success SUDO 'cleanup regression' '
 	sudo rm -rf root
-- 
2.36.0.352.g0cd7feaf86f


       reply	other threads:[~2022-05-05  0:51 UTC|newest]

Thread overview: 5+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
     [not found] <20220504184401.17438-1-carenas@gmail.com>
2022-05-05  0:50 ` Carlo Marcelo Arenas Belón [this message]
2022-05-05  9:40   ` [PATCH v2] setup: tighten ownership checks post CVE-2022-24765 Phillip Wood
2022-05-05 12:04     ` Phillip Wood
2022-05-05 13:14   ` Derrick Stolee
2022-05-05 13:58     ` Derrick Stolee

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

  List information: http://vger.kernel.org/majordomo-info.html

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20220505005009.27789-1-carenas@gmail.com \
    --to=carenas@gmail.com \
    --cc=Johannes.Schindelin@gmx.de \
    --cc=git@vger.kernel.org \
    --cc=junio@pobox.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
Code repositories for project(s) associated with this public inbox

	https://80x24.org/mirrors/git.git

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).