Merge pull request #26512 from Luap99/machine-tls-cert

pkg/machine/e2e: add CVE-2025-6032 regression test
This commit is contained in:
openshift-merge-bot[bot] 2025-06-26 17:40:10 +00:00 committed by GitHub
commit 3000b1e239
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
3 changed files with 103 additions and 0 deletions

View File

@ -3,12 +3,14 @@ package e2e_test
import ( import (
"fmt" "fmt"
"io" "io"
"log"
"net" "net"
"net/http" "net/http"
"net/url" "net/url"
"os" "os"
"path" "path"
"path/filepath" "path/filepath"
"runtime"
"strings" "strings"
"time" "time"
@ -285,6 +287,22 @@ var _ = Describe("run basic podman commands", func() {
Expect(run).To(Exit(0)) Expect(run).To(Exit(0))
Expect(build.outputToString()).To(ContainSubstring(name)) Expect(build.outputToString()).To(ContainSubstring(name))
}) })
It("CVE-2025-6032 regression test - HTTP", func() {
// ensure that trying to pull from a local HTTP server fails and the connection will be rejected
testImagePullTLS(nil)
})
It("CVE-2025-6032 regression test - HTTPS unknown cert", func() {
// ensure that trying to pull from an local HTTPS server with invalid certs fails and the connection will be rejected
testImagePullTLS(&TLSConfig{
// Key/Cert was generated with:
// openssl req -x509 -newkey ec -pkeyopt ec_paramgen_curve:secp384r1 -days 3650 \
// -nodes -keyout test-tls.key -out test-tls.crt -subj "/CN=test.podman.io" -addext "subjectAltName=IP:127.0.0.1"
key: "test-tls.key",
cert: "test-tls.crt",
})
})
}) })
func testHTTPServer(port string, shouldErr bool, expectedResponse string) { func testHTTPServer(port string, shouldErr bool, expectedResponse string) {
@ -315,3 +333,70 @@ func testHTTPServer(port string, shouldErr bool, expectedResponse string) {
Expect(err).ToNot(HaveOccurred()) Expect(err).ToNot(HaveOccurred())
Expect(string(body)).Should(Equal(expectedResponse)) Expect(string(body)).Should(Equal(expectedResponse))
} }
type TLSConfig struct {
key string
cert string
}
// setup a local webserver in the test and then point podman machine init to it
// to verify the connection details.
func testImagePullTLS(tls *TLSConfig) {
listener, err := net.Listen("tcp4", "127.0.0.1:0")
Expect(err).ToNot(HaveOccurred())
serverAddr := listener.Addr().String()
var loggedRequests []string
mux := http.NewServeMux()
mux.HandleFunc("/", func(w http.ResponseWriter, r *http.Request) {
loggedRequests = append(loggedRequests, r.URL.Path)
// don't care about an error, we should never get here
_, _ = w.Write([]byte("Hello"))
})
srv := &http.Server{
Handler: mux,
ErrorLog: log.New(io.Discard, "", 0),
}
defer srv.Close()
serverErr := make(chan error)
go func() {
defer GinkgoRecover()
if tls != nil {
serverErr <- srv.ServeTLS(listener, tls.cert, tls.key)
} else {
serverErr <- srv.Serve(listener)
}
}()
name := randomString()
i := new(initMachine)
session, err := mb.setName(name).setCmd(i.withImage("docker://" + serverAddr + "/testimage")).run()
Expect(err).ToNot(HaveOccurred())
Expect(session).To(Exit(125))
// Note because we don't run a real registry the error you get when TLS is not checked is:
// Error: wrong manifest type for disk artifact: text/plain
// As such we match the errors strings exactly to ensure we have proper error messages that indicate the TLS error.
expectedErr := "Error: pinging container registry " + serverAddr + ": Get \"https://" + serverAddr + "/v2/\": "
if tls != nil {
expectedErr += "tls: failed to verify certificate: x509: "
if runtime.GOOS == "darwin" {
// Apple doesn't like such long valid certs so the error is different but the purpose
// is the same, it rejected a cert which is how we know TLS verification is turned on.
// https://support.apple.com/en-au/102028
expectedErr += "“test.podman.io” certificate is not standards compliant\n"
} else {
expectedErr += "certificate signed by unknown authority\n"
}
} else {
expectedErr += "http: server gave HTTP response to HTTPS client\n"
}
Expect(session.errorToString()).To(Equal(expectedErr))
// if the client enforces TLS verification then we should not have received any request
Expect(loggedRequests).To(BeEmpty(), "the server should have not process any request from the client")
srv.Close()
Expect(<-serverErr).To(Equal(http.ErrServerClosed))
}

View File

@ -0,0 +1,12 @@
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

View File

@ -0,0 +1,6 @@
-----BEGIN PRIVATE KEY-----
MIG2AgEAMBAGByqGSM49AgEGBSuBBAAiBIGeMIGbAgEBBDDVCVCJ8wu0WUCohjgJ
K3bJSk0MLXT/uxy/A3tluioR+QUFKBJBRwJDOmEGkw2tyyahZANiAAST6MMacqsc
fn++baDO8GIJp+kAQ79x61SbwoC9KBabwv9136qJFkPd9MrOGABvyYC/WCMW+/2k
WVTqq1wYccUZ2lcPcv+/5z/EWgoD28eevQnd2L6rCZKocE4/aRHWzOw=
-----END PRIVATE KEY-----