From b123e8887dc29eb2764162c048e8521a4072531a Mon Sep 17 00:00:00 2001 From: Stefan Agner Date: Wed, 19 Oct 2022 10:56:16 +0200 Subject: [PATCH] package/openvmtools: fix CVE-2022-31676 Add a patch for CVE-2022-31676 (local privilege escalation vulnerability). Signed-off-by: Stefan Agner Signed-off-by: Thomas Petazzoni --- ...uthorization-on-incoming-guestOps-re.patch | 40 +++++++++++++++++++ package/openvmtools/openvmtools.mk | 3 ++ 2 files changed, 43 insertions(+) create mode 100644 package/openvmtools/0013-Properly-check-authorization-on-incoming-guestOps-re.patch diff --git a/package/openvmtools/0013-Properly-check-authorization-on-incoming-guestOps-re.patch b/package/openvmtools/0013-Properly-check-authorization-on-incoming-guestOps-re.patch new file mode 100644 index 0000000000..91e379b9a6 --- /dev/null +++ b/package/openvmtools/0013-Properly-check-authorization-on-incoming-guestOps-re.patch @@ -0,0 +1,40 @@ +From bb9f9ffbb151397545f921cee5b6a4933c6eea80 Mon Sep 17 00:00:00 2001 +Message-Id: +From: John Wolfe +Date: Wed, 10 Aug 2022 06:12:02 -0700 +Subject: [PATCH] Properly check authorization on incoming guestOps requests + +Fix public pipe request checks. Only a SessionRequest type should +be accepted on the public pipe. + +Upstream: https://github.com/vmware/open-vm-tools/blob/CVE-2022-31676.patch/1205-Properly-check-authorization-on-incoming-guestOps-re.patch +Signed-off-by: Stefan Agner +--- + vgauth/serviceImpl/proto.c | 6 +++++- + 1 file changed, 5 insertions(+), 1 deletion(-) + +diff --git a/vgauth/serviceImpl/proto.c b/vgauth/serviceImpl/proto.c +index db7159ee..c4f85b02 100644 +--- a/vgauth/serviceImpl/proto.c ++++ b/vgauth/serviceImpl/proto.c +@@ -1,5 +1,5 @@ + /********************************************************* +- * Copyright (C) 2011-2016,2019-2021 VMware, Inc. All rights reserved. ++ * Copyright (c) 2011-2016,2019-2022 VMware, Inc. All rights reserved. + * + * This program is free software; you can redistribute it and/or modify it + * under the terms of the GNU Lesser General Public License as published +@@ -1201,6 +1201,10 @@ Proto_SecurityCheckRequest(ServiceConnection *conn, + VGAuthError err; + gboolean isSecure = ServiceNetworkIsConnectionPrivateSuperUser(conn); + ++ if (conn->isPublic && req->reqType != PROTO_REQUEST_SESSION_REQ) { ++ return VGAUTH_E_PERMISSION_DENIED; ++ } ++ + switch (req->reqType) { + /* + * This comes over the public connection; alwsys let it through. +-- +2.38.0 + diff --git a/package/openvmtools/openvmtools.mk b/package/openvmtools/openvmtools.mk index d536e5e819..3106b9ecd6 100644 --- a/package/openvmtools/openvmtools.mk +++ b/package/openvmtools/openvmtools.mk @@ -13,6 +13,9 @@ OPENVMTOOLS_LICENSE_FILES = COPYING OPENVMTOOLS_CPE_ID_VENDOR = vmware OPENVMTOOLS_CPE_ID_PRODUCT = tools +# 0013-Properly-check-authorization-on-incoming-guestOps-re.patch +OPENVMTOOLS_IGNORE_CVES += CVE-2022-31676 + # configure.ac is patched OPENVMTOOLS_AUTORECONF = YES OPENVMTOOLS_CONF_OPTS = --with-dnet \