All of lore.kernel.org
 help / color / mirror / Atom feed
* Re: [OE-core] [oe][zeus][PATCH] go: Security Advisory - go - CVE-2020-28366
       [not found] <164837A6030793E3.5807@lists.openembedded.org>
@ 2020-11-19  1:17 ` Li Zhou
  0 siblings, 0 replies; only message in thread
From: Li Zhou @ 2020-11-19  1:17 UTC (permalink / raw)
  To: openembedded-core

[-- Attachment #1: Type: text/plain, Size: 15668 bytes --]

Please omit this patch. Thank you.

On 11/17/20 2:26 PM, Li Zhou wrote:
> Backport commit from <https://github.com/golang/go/commit/
> 32159824698a82a174b60a6845e8494ae3243102> to solve CVE-2020-28366.
> Adapted the patch to solve context issues.
>
> Signed-off-by: Li Zhou <li.zhou@windriver.com>
> ---
>   meta/recipes-devtools/go/go-1.12.inc               |   1 +
>   .../go/go-1.12/CVE-2020-28366.patch                | 410 +++++++++++++++++++++
>   2 files changed, 411 insertions(+)
>   create mode 100644 meta/recipes-devtools/go/go-1.12/CVE-2020-28366.patch
>
> diff --git a/meta/recipes-devtools/go/go-1.12.inc b/meta/recipes-devtools/go/go-1.12.inc
> index 2a0680a..ecf26c6 100644
> --- a/meta/recipes-devtools/go/go-1.12.inc
> +++ b/meta/recipes-devtools/go/go-1.12.inc
> @@ -22,6 +22,7 @@ SRC_URI += "\
>       file://CVE-2020-16845.patch \
>       file://0001-net-http-cgi-rename-a-test-file-to-be-less-cute.patch \
>       file://CVE-2020-24553.patch \
> +    file://CVE-2020-28366.patch \
>   "
>   SRC_URI_append_libc-musl = " file://0009-ld-replace-glibc-dynamic-linker-with-musl.patch"
>   
> diff --git a/meta/recipes-devtools/go/go-1.12/CVE-2020-28366.patch b/meta/recipes-devtools/go/go-1.12/CVE-2020-28366.patch
> new file mode 100644
> index 0000000..bcc70ce
> --- /dev/null
> +++ b/meta/recipes-devtools/go/go-1.12/CVE-2020-28366.patch
> @@ -0,0 +1,410 @@
> +From 655749e7aff89bcee89d179b4cebdcfd770d1a8f Mon Sep 17 00:00:00 2001
> +From: Li Zhou <li.zhou@windriver.com>
> +Date: Mon, 16 Nov 2020 09:15:51 +0000
> +Subject: [PATCH] [release-branch.go1.15-security] cmd/go, cmd/cgo: don't let
> + bogus symbol set cgo_ldflag
> +
> +A hand-edited object file can have a symbol name that uses newline and
> +other normally invalid characters. The cgo tool will generate Go files
> +containing symbol names, unquoted. That can permit those symbol names
> +to inject Go code into a cgo-generated file. If that Go code uses the
> +//go:cgo_ldflag pragma, it can cause the C linker to run arbitrary
> +code when building a package. If you build an imported package we
> +permit arbitrary code at run time, but we don't want to permit it at
> +package build time. This CL prevents this in two ways.
> +
> +In cgo, reject invalid symbols that contain non-printable or space
> +characters, or that contain anything that looks like a Go comment.
> +
> +In the go tool, double check all //go:cgo_ldflag directives in
> +generated code, to make sure they follow the existing LDFLAG restrictions.
> +
> +Thanks to Chris Brown and Tempus Ex for reporting this.
> +
> +Fixes CVE-2020-28366
> +
> +Change-Id: Ia1ad8f3791ea79612690fa7d26ac451d0f6df7c1
> +Reviewed-on: https://team-review.git.corp.google.com/c/golang/go-private/+/895832
> +Reviewed-by: Than McIntosh <thanm@google.com>
> +Reviewed-by: Cherry Zhang <cherryyz@google.com>
> +(cherry picked from commit 6bc814dd2bbfeaafa41d314dd4cc591b575dfbf6)
> +Reviewed-on: https://team-review.git.corp.google.com/c/golang/go-private/+/901056
> +Reviewed-by: Filippo Valsorda <valsorda@google.com>
> +Reviewed-by: Roland Shoemaker <bracewell@google.com>
> +
> +Upstream-Status: Backport
> +CVE: CVE-2020-28366
> +Signed-off-by: Li Zhou <li.zhou@windriver.com>
> +---
> + misc/cgo/errors/badsym_test.go   | 216 +++++++++++++++++++++++++++++++
> + src/cmd/cgo/out.go               |  24 ++++
> + src/cmd/go/internal/work/exec.go |  60 +++++++++
> + 3 files changed, 300 insertions(+)
> + create mode 100644 misc/cgo/errors/badsym_test.go
> +
> +diff --git a/misc/cgo/errors/badsym_test.go b/misc/cgo/errors/badsym_test.go
> +new file mode 100644
> +index 0000000..b2701bf
> +--- /dev/null
> ++++ b/misc/cgo/errors/badsym_test.go
> +@@ -0,0 +1,216 @@
> ++// Copyright 2020 The Go Authors. All rights reserved.
> ++// Use of this source code is governed by a BSD-style
> ++// license that can be found in the LICENSE file.
> ++
> ++package errorstest
> ++
> ++import (
> ++	"bytes"
> ++	"io/ioutil"
> ++	"os"
> ++	"os/exec"
> ++	"path/filepath"
> ++	"strings"
> ++	"testing"
> ++	"unicode"
> ++)
> ++
> ++// A manually modified object file could pass unexpected characters
> ++// into the files generated by cgo.
> ++
> ++const magicInput = "abcdefghijklmnopqrstuvwxyz0123"
> ++const magicReplace = "\n//go:cgo_ldflag \"-badflag\"\n//"
> ++
> ++const cSymbol = "BadSymbol" + magicInput + "Name"
> ++const cDefSource = "int " + cSymbol + " = 1;"
> ++const cRefSource = "extern int " + cSymbol + "; int F() { return " + cSymbol + "; }"
> ++
> ++// goSource is the source code for the trivial Go file we use.
> ++// We will replace TMPDIR with the temporary directory name.
> ++const goSource = `
> ++package main
> ++
> ++// #cgo LDFLAGS: TMPDIR/cbad.o TMPDIR/cbad.so
> ++// extern int F();
> ++import "C"
> ++
> ++func main() {
> ++	println(C.F())
> ++}
> ++`
> ++
> ++func TestBadSymbol(t *testing.T) {
> ++	dir := t.TempDir()
> ++
> ++	mkdir := func(base string) string {
> ++		ret := filepath.Join(dir, base)
> ++		if err := os.Mkdir(ret, 0755); err != nil {
> ++			t.Fatal(err)
> ++		}
> ++		return ret
> ++	}
> ++
> ++	cdir := mkdir("c")
> ++	godir := mkdir("go")
> ++
> ++	makeFile := func(mdir, base, source string) string {
> ++		ret := filepath.Join(mdir, base)
> ++		if err := ioutil.WriteFile(ret, []byte(source), 0644); err != nil {
> ++			t.Fatal(err)
> ++		}
> ++		return ret
> ++	}
> ++
> ++	cDefFile := makeFile(cdir, "cdef.c", cDefSource)
> ++	cRefFile := makeFile(cdir, "cref.c", cRefSource)
> ++
> ++	ccCmd := cCompilerCmd(t)
> ++
> ++	cCompile := func(arg, base, src string) string {
> ++		out := filepath.Join(cdir, base)
> ++		run := append(ccCmd, arg, "-o", out, src)
> ++		output, err := exec.Command(run[0], run[1:]...).CombinedOutput()
> ++		if err != nil {
> ++			t.Log(run)
> ++			t.Logf("%s", output)
> ++			t.Fatal(err)
> ++		}
> ++		if err := os.Remove(src); err != nil {
> ++			t.Fatal(err)
> ++		}
> ++		return out
> ++	}
> ++
> ++	// Build a shared library that defines a symbol whose name
> ++	// contains magicInput.
> ++
> ++	cShared := cCompile("-shared", "c.so", cDefFile)
> ++
> ++	// Build an object file that refers to the symbol whose name
> ++	// contains magicInput.
> ++
> ++	cObj := cCompile("-c", "c.o", cRefFile)
> ++
> ++	// Rewrite the shared library and the object file, replacing
> ++	// magicInput with magicReplace. This will have the effect of
> ++	// introducing a symbol whose name looks like a cgo command.
> ++	// The cgo tool will use that name when it generates the
> ++	// _cgo_import.go file, thus smuggling a magic //go:cgo_ldflag
> ++	// pragma into a Go file. We used to not check the pragmas in
> ++	// _cgo_import.go.
> ++
> ++	rewrite := func(from, to string) {
> ++		obj, err := ioutil.ReadFile(from)
> ++		if err != nil {
> ++			t.Fatal(err)
> ++		}
> ++
> ++		if bytes.Count(obj, []byte(magicInput)) == 0 {
> ++			t.Fatalf("%s: did not find magic string", from)
> ++		}
> ++
> ++		if len(magicInput) != len(magicReplace) {
> ++			t.Fatalf("internal test error: different magic lengths: %d != %d", len(magicInput), len(magicReplace))
> ++		}
> ++
> ++		obj = bytes.ReplaceAll(obj, []byte(magicInput), []byte(magicReplace))
> ++
> ++		if err := ioutil.WriteFile(to, obj, 0644); err != nil {
> ++			t.Fatal(err)
> ++		}
> ++	}
> ++
> ++	cBadShared := filepath.Join(godir, "cbad.so")
> ++	rewrite(cShared, cBadShared)
> ++
> ++	cBadObj := filepath.Join(godir, "cbad.o")
> ++	rewrite(cObj, cBadObj)
> ++
> ++	goSourceBadObject := strings.ReplaceAll(goSource, "TMPDIR", godir)
> ++	makeFile(godir, "go.go", goSourceBadObject)
> ++
> ++	makeFile(godir, "go.mod", "module badsym")
> ++
> ++	// Try to build our little package.
> ++	cmd := exec.Command("go", "build", "-ldflags=-v")
> ++	cmd.Dir = godir
> ++	output, err := cmd.CombinedOutput()
> ++
> ++	// The build should fail, but we want it to fail because we
> ++	// detected the error, not because we passed a bad flag to the
> ++	// C linker.
> ++
> ++	if err == nil {
> ++		t.Errorf("go build succeeded unexpectedly")
> ++	}
> ++
> ++	t.Logf("%s", output)
> ++
> ++	for _, line := range bytes.Split(output, []byte("\n")) {
> ++		if bytes.Contains(line, []byte("dynamic symbol")) && bytes.Contains(line, []byte("contains unsupported character")) {
> ++			// This is the error from cgo.
> ++			continue
> ++		}
> ++
> ++		// We passed -ldflags=-v to see the external linker invocation,
> ++		// which should not include -badflag.
> ++		if bytes.Contains(line, []byte("-badflag")) {
> ++			t.Error("output should not mention -badflag")
> ++		}
> ++
> ++		// Also check for compiler errors, just in case.
> ++		// GCC says "unrecognized command line option".
> ++		// clang says "unknown argument".
> ++		if bytes.Contains(line, []byte("unrecognized")) || bytes.Contains(output, []byte("unknown")) {
> ++			t.Error("problem should have been caught before invoking C linker")
> ++		}
> ++	}
> ++}
> ++
> ++func cCompilerCmd(t *testing.T) []string {
> ++	cc := []string{goEnv(t, "CC")}
> ++
> ++	out := goEnv(t, "GOGCCFLAGS")
> ++	quote := '\000'
> ++	start := 0
> ++	lastSpace := true
> ++	backslash := false
> ++	s := string(out)
> ++	for i, c := range s {
> ++		if quote == '\000' && unicode.IsSpace(c) {
> ++			if !lastSpace {
> ++				cc = append(cc, s[start:i])
> ++				lastSpace = true
> ++			}
> ++		} else {
> ++			if lastSpace {
> ++				start = i
> ++				lastSpace = false
> ++			}
> ++			if quote == '\000' && !backslash && (c == '"' || c == '\'') {
> ++				quote = c
> ++				backslash = false
> ++			} else if !backslash && quote == c {
> ++				quote = '\000'
> ++			} else if (quote == '\000' || quote == '"') && !backslash && c == '\\' {
> ++				backslash = true
> ++			} else {
> ++				backslash = false
> ++			}
> ++		}
> ++	}
> ++	if !lastSpace {
> ++		cc = append(cc, s[start:])
> ++	}
> ++	return cc
> ++}
> ++
> ++func goEnv(t *testing.T, key string) string {
> ++	out, err := exec.Command("go", "env", key).CombinedOutput()
> ++	if err != nil {
> ++		t.Logf("go env %s\n", key)
> ++		t.Logf("%s", out)
> ++		t.Fatal(err)
> ++	}
> ++	return strings.TrimSpace(string(out))
> ++}
> +diff --git a/src/cmd/cgo/out.go b/src/cmd/cgo/out.go
> +index 0cf8b17..338cb82 100644
> +--- a/src/cmd/cgo/out.go
> ++++ b/src/cmd/cgo/out.go
> +@@ -22,6 +22,7 @@ import (
> + 	"regexp"
> + 	"sort"
> + 	"strings"
> ++	"unicode"
> + )
> +
> + var (
> +@@ -296,6 +297,8 @@ func dynimport(obj string) {
> + 			if s.Version != "" {
> + 				targ += "#" + s.Version
> + 			}
> ++			checkImportSymName(s.Name)
> ++			checkImportSymName(targ)
> + 			fmt.Fprintf(stdout, "//go:cgo_import_dynamic %s %s %q\n", s.Name, targ, s.Library)
> + 		}
> + 		lib, _ := f.ImportedLibraries()
> +@@ -311,6 +314,7 @@ func dynimport(obj string) {
> + 			if len(s) > 0 && s[0] == '_' {
> + 				s = s[1:]
> + 			}
> ++			checkImportSymName(s)
> + 			fmt.Fprintf(stdout, "//go:cgo_import_dynamic %s %s %q\n", s, s, "")
> + 		}
> + 		lib, _ := f.ImportedLibraries()
> +@@ -325,6 +329,8 @@ func dynimport(obj string) {
> + 		for _, s := range sym {
> + 			ss := strings.Split(s, ":")
> + 			name := strings.Split(ss[0], "@")[0]
> ++			checkImportSymName(name)
> ++			checkImportSymName(ss[0])
> + 			fmt.Fprintf(stdout, "//go:cgo_import_dynamic %s %s %q\n", name, ss[0], strings.ToLower(ss[1]))
> + 		}
> + 		return
> +@@ -336,6 +342,7 @@ func dynimport(obj string) {
> + 			fatalf("cannot load imported symbols from XCOFF file %s: %v", obj, err)
> + 		}
> + 		for _, s := range sym {
> ++			checkImportSymName(s.Name)
> + 			fmt.Fprintf(stdout, "//go:cgo_import_dynamic %s %s %q\n", s.Name, s.Name, s.Library)
> + 		}
> + 		lib, err := f.ImportedLibraries()
> +@@ -351,6 +358,23 @@ func dynimport(obj string) {
> + 	fatalf("cannot parse %s as ELF, Mach-O, PE or XCOFF", obj)
> + }
> +
> ++// checkImportSymName checks a symbol name we are going to emit as part
> ++// of a //go:cgo_import_dynamic pragma. These names come from object
> ++// files, so they may be corrupt. We are going to emit them unquoted,
> ++// so while they don't need to be valid symbol names (and in some cases,
> ++// involving symbol versions, they won't be) they must contain only
> ++// graphic characters and must not contain Go comments.
> ++func checkImportSymName(s string) {
> ++	for _, c := range s {
> ++		if !unicode.IsGraphic(c) || unicode.IsSpace(c) {
> ++			fatalf("dynamic symbol %q contains unsupported character", s)
> ++		}
> ++	}
> ++	if strings.Index(s, "//") >= 0 || strings.Index(s, "/*") >= 0 {
> ++		fatalf("dynamic symbol %q contains Go comment")
> ++	}
> ++}
> ++
> + // Construct a gcc struct matching the gc argument frame.
> + // Assumes that in gcc, char is 1 byte, short 2 bytes, int 4 bytes, long long 8 bytes.
> + // These assumptions are checked by the gccProlog.
> +diff --git a/src/cmd/go/internal/work/exec.go b/src/cmd/go/internal/work/exec.go
> +index 3f7e51e..aab093c 100644
> +--- a/src/cmd/go/internal/work/exec.go
> ++++ b/src/cmd/go/internal/work/exec.go
> +@@ -2638,6 +2638,66 @@ func (b *Builder) cgo(a *Action, cgoExe, objdir string, pcCFLAGS, pcLDFLAGS, cgo
> + 		noCompiler()
> + 	}
> +
> ++	// Double check the //go:cgo_ldflag comments in the generated files.
> ++	// The compiler only permits such comments in files whose base name
> ++	// starts with "_cgo_". Make sure that the comments in those files
> ++	// are safe. This is a backstop against people somehow smuggling
> ++	// such a comment into a file generated by cgo.
> ++	if cfg.BuildToolchainName == "gc" && !cfg.BuildN {
> ++		var flags []string
> ++		for _, f := range outGo {
> ++			if !strings.HasPrefix(filepath.Base(f), "_cgo_") {
> ++				continue
> ++			}
> ++
> ++			src, err := ioutil.ReadFile(f)
> ++			if err != nil {
> ++				return nil, nil, err
> ++			}
> ++
> ++			const cgoLdflag = "//go:cgo_ldflag"
> ++			idx := bytes.Index(src, []byte(cgoLdflag))
> ++			for idx >= 0 {
> ++				// We are looking at //go:cgo_ldflag.
> ++				// Find start of line.
> ++				start := bytes.LastIndex(src[:idx], []byte("\n"))
> ++				if start == -1 {
> ++					start = 0
> ++				}
> ++
> ++				// Find end of line.
> ++				end := bytes.Index(src[idx:], []byte("\n"))
> ++				if end == -1 {
> ++					end = len(src)
> ++				} else {
> ++					end += idx
> ++				}
> ++
> ++				// Check for first line comment in line.
> ++				// We don't worry about /* */ comments,
> ++				// which normally won't appear in files
> ++				// generated by cgo.
> ++				commentStart := bytes.Index(src[start:], []byte("//"))
> ++				commentStart += start
> ++				// If that line comment is //go:cgo_ldflag,
> ++				// it's a match.
> ++				if bytes.HasPrefix(src[commentStart:], []byte(cgoLdflag)) {
> ++					// Pull out the flag, and unquote it.
> ++					// This is what the compiler does.
> ++					flag := string(src[idx+len(cgoLdflag) : end])
> ++					flag = strings.TrimSpace(flag)
> ++					flag = strings.Trim(flag, `"`)
> ++					flags = append(flags, flag)
> ++				}
> ++				src = src[end:]
> ++				idx = bytes.Index(src, []byte(cgoLdflag))
> ++			}
> ++		}
> ++		if err := checkLinkerFlags("LDFLAGS", "go:cgo_ldflag", flags); err != nil {
> ++			return nil, nil, err
> ++		}
> ++	}
> ++
> + 	return outGo, outObj, nil
> + }
> +
> +--
> +2.23.0
> +
>
> 
>
-- 
Best Regards!
Zhou Li
Phone number: 86-10-84778511


[-- Attachment #2: Type: text/html, Size: 17633 bytes --]

^ permalink raw reply	[flat|nested] only message in thread

only message in thread, other threads:[~2020-11-19  1:18 UTC | newest]

Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
     [not found] <164837A6030793E3.5807@lists.openembedded.org>
2020-11-19  1:17 ` [OE-core] [oe][zeus][PATCH] go: Security Advisory - go - CVE-2020-28366 Li Zhou

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.