+ 0015-bsc1247362-release-container-layer-on-export.patch OBS-URL: https://build.opensuse.org/package/show/Virtualization:containers/docker-stable?expand=0&rev=33
138 lines
4.8 KiB
Diff
138 lines
4.8 KiB
Diff
From 0f1bec6ecc1b769c80d02a59f683c4cd634cc5f0 Mon Sep 17 00:00:00 2001
|
|
From: Aleksa Sarai <cyphar@cyphar.com>
|
|
Date: Tue, 25 Mar 2025 12:05:38 +1100
|
|
Subject: [PATCH 13/14] CVE-2025-22869: vendor: ssh: limit the size of the
|
|
internal packet queue while waiting for KEX
|
|
|
|
In the SSH protocol, clients and servers execute the key exchange to
|
|
generate one-time session keys used for encryption and authentication.
|
|
The key exchange is performed initially after the connection is
|
|
established and then periodically after a configurable amount of data.
|
|
While a key exchange is in progress, we add the received packets to an
|
|
internal queue until we receive SSH_MSG_KEXINIT from the other side.
|
|
This can result in high memory usage if the other party is slow to
|
|
respond to the SSH_MSG_KEXINIT packet, or memory exhaustion if a
|
|
malicious client never responds to an SSH_MSG_KEXINIT packet during a
|
|
large file transfer.
|
|
We now limit the internal queue to 64 packets: this means 2MB with the
|
|
typical 32KB packet size.
|
|
When the internal queue is full we block further writes until the
|
|
pending key exchange is completed or there is a read or write error.
|
|
|
|
Thanks to Yuichi Watanabe for reporting this issue.
|
|
|
|
Fixes: CVE-2025-22869
|
|
Reviewed-on: https://go-review.googlesource.com/c/crypto/+/652135
|
|
Reviewed-by: Neal Patel <nealpatel@google.com>
|
|
Reviewed-by: Roland Shoemaker <roland@golang.org>
|
|
(Cherry-picked from golang.org/x/crypto@7292932d45d55c7199324ab0027cc86e8198aa22.)
|
|
SUSE-Bugs: https://bugzilla.suse.com/show_bug.cgi?id=1239322
|
|
Signed-off-by: Aleksa Sarai <cyphar@cyphar.com>
|
|
---
|
|
vendor/golang.org/x/crypto/ssh/handshake.go | 47 ++++++++++++++++-----
|
|
1 file changed, 37 insertions(+), 10 deletions(-)
|
|
|
|
diff --git a/vendor/golang.org/x/crypto/ssh/handshake.go b/vendor/golang.org/x/crypto/ssh/handshake.go
|
|
index 70a7369ff913..e14eb6cba077 100644
|
|
--- a/vendor/golang.org/x/crypto/ssh/handshake.go
|
|
+++ b/vendor/golang.org/x/crypto/ssh/handshake.go
|
|
@@ -24,6 +24,11 @@ const debugHandshake = false
|
|
// quickly.
|
|
const chanSize = 16
|
|
|
|
+// maxPendingPackets sets the maximum number of packets to queue while waiting
|
|
+// for KEX to complete. This limits the total pending data to maxPendingPackets
|
|
+// * maxPacket bytes, which is ~16.8MB.
|
|
+const maxPendingPackets = 64
|
|
+
|
|
// keyingTransport is a packet based transport that supports key
|
|
// changes. It need not be thread-safe. It should pass through
|
|
// msgNewKeys in both directions.
|
|
@@ -58,11 +63,19 @@ type handshakeTransport struct {
|
|
incoming chan []byte
|
|
readError error
|
|
|
|
- mu sync.Mutex
|
|
- writeError error
|
|
- sentInitPacket []byte
|
|
- sentInitMsg *kexInitMsg
|
|
- pendingPackets [][]byte // Used when a key exchange is in progress.
|
|
+ mu sync.Mutex
|
|
+ // Condition for the above mutex. It is used to notify a completed key
|
|
+ // exchange or a write failure. Writes can wait for this condition while a
|
|
+ // key exchange is in progress.
|
|
+ writeCond *sync.Cond
|
|
+ writeError error
|
|
+ sentInitPacket []byte
|
|
+ sentInitMsg *kexInitMsg
|
|
+ // Used to queue writes when a key exchange is in progress. The length is
|
|
+ // limited by pendingPacketsSize. Once full, writes will block until the key
|
|
+ // exchange is completed or an error occurs. If not empty, it is emptied
|
|
+ // all at once when the key exchange is completed in kexLoop.
|
|
+ pendingPackets [][]byte
|
|
writePacketsLeft uint32
|
|
writeBytesLeft int64
|
|
|
|
@@ -114,6 +127,7 @@ func newHandshakeTransport(conn keyingTransport, config *Config, clientVersion,
|
|
|
|
config: config,
|
|
}
|
|
+ t.writeCond = sync.NewCond(&t.mu)
|
|
t.resetReadThresholds()
|
|
t.resetWriteThresholds()
|
|
|
|
@@ -236,6 +250,7 @@ func (t *handshakeTransport) recordWriteError(err error) {
|
|
defer t.mu.Unlock()
|
|
if t.writeError == nil && err != nil {
|
|
t.writeError = err
|
|
+ t.writeCond.Broadcast()
|
|
}
|
|
}
|
|
|
|
@@ -339,6 +354,8 @@ write:
|
|
}
|
|
}
|
|
t.pendingPackets = t.pendingPackets[:0]
|
|
+ // Unblock writePacket if waiting for KEX.
|
|
+ t.writeCond.Broadcast()
|
|
t.mu.Unlock()
|
|
}
|
|
|
|
@@ -526,11 +543,20 @@ func (t *handshakeTransport) writePacket(p []byte) error {
|
|
}
|
|
|
|
if t.sentInitMsg != nil {
|
|
- // Copy the packet so the writer can reuse the buffer.
|
|
- cp := make([]byte, len(p))
|
|
- copy(cp, p)
|
|
- t.pendingPackets = append(t.pendingPackets, cp)
|
|
- return nil
|
|
+ if len(t.pendingPackets) < maxPendingPackets {
|
|
+ // Copy the packet so the writer can reuse the buffer.
|
|
+ cp := make([]byte, len(p))
|
|
+ copy(cp, p)
|
|
+ t.pendingPackets = append(t.pendingPackets, cp)
|
|
+ return nil
|
|
+ }
|
|
+ for t.sentInitMsg != nil {
|
|
+ // Block and wait for KEX to complete or an error.
|
|
+ t.writeCond.Wait()
|
|
+ if t.writeError != nil {
|
|
+ return t.writeError
|
|
+ }
|
|
+ }
|
|
}
|
|
|
|
if t.writeBytesLeft > 0 {
|
|
@@ -547,6 +573,7 @@ func (t *handshakeTransport) writePacket(p []byte) error {
|
|
|
|
if err := t.pushPacket(p); err != nil {
|
|
t.writeError = err
|
|
+ t.writeCond.Broadcast()
|
|
}
|
|
|
|
return nil
|
|
--
|
|
2.49.0
|
|
|