提交 61835863 编写于 作者: D Daniel P. Berrangé

locking: restrict sockets to mode 0600

The virtlockd daemon's only intended client is the libvirtd daemon. As
such it should never allow clients from other user accounts to connect.
The code already enforces this and drops clients from other UIDs, but
we can get earlier (and thus stronger) protection against DoS by setting
the socket permissions to 0600

Fixes CVE-2019-10132
Reviewed-by: NJán Tomko <jtomko@redhat.com>
Signed-off-by: NDaniel P. Berrangé <berrange@redhat.com>
(cherry picked from commit f111e094)
上级 d1017aee
...@@ -5,6 +5,7 @@ Before=libvirtd.service ...@@ -5,6 +5,7 @@ Before=libvirtd.service
[Socket] [Socket]
ListenStream=@localstatedir@/run/libvirt/virtlockd-admin-sock ListenStream=@localstatedir@/run/libvirt/virtlockd-admin-sock
Service=virtlockd.service Service=virtlockd.service
SocketMode=0600
[Install] [Install]
WantedBy=sockets.target WantedBy=sockets.target
...@@ -4,6 +4,7 @@ Before=libvirtd.service ...@@ -4,6 +4,7 @@ Before=libvirtd.service
[Socket] [Socket]
ListenStream=@localstatedir@/run/libvirt/virtlockd-sock ListenStream=@localstatedir@/run/libvirt/virtlockd-sock
SocketMode=0600
[Install] [Install]
WantedBy=sockets.target WantedBy=sockets.target
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册