!36 [sync] PR-35: docker:prevent an invalid image from crashing docker daemon(CVE-2021-21285)

From: @openeuler-sync-bot
Reviewed-by: @jing-rui,@caihaomin
Signed-off-by: @caihaomin
This commit is contained in:
openeuler-ci-bot 2021-03-19 11:17:34 +08:00 committed by Gitee
commit 94d0954ade
4 changed files with 63 additions and 2 deletions

View File

@ -1 +1 @@
18.09.0.201
18.09.0.202

View File

@ -1,6 +1,6 @@
Name: docker-engine
Version: 18.09.0
Release: 201
Release: 202
Summary: The open-source application container engine
Group: Tools/Docker
@ -200,6 +200,12 @@ fi
%endif
%changelog
* Thu Mar 18 2021 xiadanni<xiadanni1@huawei.com> - 18.09.0-202
- Type:bugfix
- ID:NA
- SUG:NA
- DESC:prevent an invalid image from crashing docker daemon(CVE-2021-21285)
* Wed Feb 24 2021 xiadanni<xiadanni1@huawei.com> - 18.09.0-201
- Type:bugfix
- ID:NA

View File

@ -0,0 +1,54 @@
From c6870e57fa9f7667c59dd21abd6e8034509b6ada Mon Sep 17 00:00:00 2001
From: xiadanni <xiadanni1@huawei.com>
Date: Thu, 18 Mar 2021 14:41:15 +0800
Subject: [PATCH] docker: prevent an invalid image from crashing docker daemon
(CVE-2021-21285)
Change-Id: I0cf6a1b268e500a2a004c9d9d33f01a3d4ad5b47
Signed-off-by: xiadanni <xiadanni1@huawei.com>
---
.../engine/builder/builder-next/adapters/containerimage/pull.go | 3 +++
components/engine/distribution/pull_v2.go | 6 ++++++
2 files changed, 9 insertions(+)
diff --git a/components/engine/builder/builder-next/adapters/containerimage/pull.go b/components/engine/builder/builder-next/adapters/containerimage/pull.go
index f6e55f4..4b6eb04 100644
--- a/components/engine/builder/builder-next/adapters/containerimage/pull.go
+++ b/components/engine/builder/builder-next/adapters/containerimage/pull.go
@@ -493,6 +493,9 @@ func (p *puller) Snapshot(ctx context.Context) (cache.ImmutableRef, error) {
layers := make([]xfer.DownloadDescriptor, 0, len(mfst.Layers))
for i, desc := range mfst.Layers {
+ if err := desc.Digest.Validate(); err != nil {
+ return nil, errors.Wrap(err, "layer digest could not be validated")
+ }
ongoing.add(desc)
layers = append(layers, &layerDescriptor{
desc: desc,
diff --git a/components/engine/distribution/pull_v2.go b/components/engine/distribution/pull_v2.go
index 4150241..98714fd 100644
--- a/components/engine/distribution/pull_v2.go
+++ b/components/engine/distribution/pull_v2.go
@@ -480,6 +480,9 @@ func (p *v2Puller) pullSchema1(ctx context.Context, ref reference.Reference, unv
// to top-most, so that the downloads slice gets ordered correctly.
for i := len(verifiedManifest.FSLayers) - 1; i >= 0; i-- {
blobSum := verifiedManifest.FSLayers[i].BlobSum
+ if err = blobSum.Validate(); err != nil {
+ return "", "", errors.Wrapf(err, "could not validate layer digest %q", blobSum)
+ }
var throwAway struct {
ThrowAway bool `json:"throwaway,omitempty"`
@@ -596,6 +599,9 @@ func (p *v2Puller) pullSchema2(ctx context.Context, ref reference.Named, mfst *s
// Note that the order of this loop is in the direction of bottom-most
// to top-most, so that the downloads slice gets ordered correctly.
for _, d := range mfst.Layers {
+ if err := d.Digest.Validate(); err != nil {
+ return "", "", errors.Wrapf(err, "could not validate layer digest %q", d.Digest)
+ }
layerDescriptor := &v2LayerDescriptor{
digest: d.Digest,
repo: p.repo,
--
1.8.3.1

View File

@ -183,4 +183,5 @@ patch/0185-docker-delete-image-reference-when-failed-to-get-ima.patch
patch/0186-docker-fix-execCommands-leak-in-health-check.patch
patch/0188-docker-check-containerd-pid-before-kill-it.patch
patch/0189-docker-fix-Access-to-remapped-root-allows-privilege-.patch
patch/0190-docker-fix-CVE-2021-21285.patch
#end