locking: restrict sockets to mode 0600
The virtlockd daemon's only intended client is the libvirtd daemon. As such it should never allow clients from other user accounts to connect. The code already enforces this and drops clients from other UIDs, but we can get earlier (and thus stronger) protection against DoS by setting the socket permissions to 0600 Fixes CVE-2019-10132 Reviewed-by: NJán Tomko <jtomko@redhat.com> Signed-off-by: NDaniel P. Berrangé <berrange@redhat.com>
Showing
-
mentioned in commit 41f06e60
-
mentioned in commit a712f016
-
mentioned in commit 63095b01
-
mentioned in commit 93d9f056
-
mentioned in commit 13d340b3
-
mentioned in commit 61835863
-
mentioned in commit 22316712
-
mentioned in commit 54005b84
-
mentioned in commit 257c5589
-
mentioned in commit ea014c9f
-
mentioned in commit 5aa8b8d1
-
mentioned in commit 771a7f2f
-
mentioned in commit 16a5284e
-
mentioned in commit 8c2c611d
想要评论请 注册 或 登录