mirror of
https://gitlab.com/libvirt/libvirt.git
synced 2024-12-22 13:45:38 +00:00
locking: restrict sockets to mode 0600
The virtlockd daemon's only intended client is the libvirtd daemon. As
such it should never allow clients from other user accounts to connect.
The code already enforces this and drops clients from other UIDs, but
we can get earlier (and thus stronger) protection against DoS by setting
the socket permissions to 0600
Fixes CVE-2019-10132
Reviewed-by: Ján Tomko <jtomko@redhat.com>
Signed-off-by: Daniel P. Berrangé <berrange@redhat.com>
(cherry picked from commit f111e09468
)
This commit is contained in:
parent
acf1763033
commit
93d9f05684
@ -5,6 +5,7 @@ Before=libvirtd.service
|
|||||||
[Socket]
|
[Socket]
|
||||||
ListenStream=@localstatedir@/run/libvirt/virtlockd-admin-sock
|
ListenStream=@localstatedir@/run/libvirt/virtlockd-admin-sock
|
||||||
Service=virtlockd.service
|
Service=virtlockd.service
|
||||||
|
SocketMode=0600
|
||||||
|
|
||||||
[Install]
|
[Install]
|
||||||
WantedBy=sockets.target
|
WantedBy=sockets.target
|
||||||
|
@ -4,6 +4,7 @@ Before=libvirtd.service
|
|||||||
|
|
||||||
[Socket]
|
[Socket]
|
||||||
ListenStream=@localstatedir@/run/libvirt/virtlockd-sock
|
ListenStream=@localstatedir@/run/libvirt/virtlockd-sock
|
||||||
|
SocketMode=0600
|
||||||
|
|
||||||
[Install]
|
[Install]
|
||||||
WantedBy=sockets.target
|
WantedBy=sockets.target
|
||||||
|
Loading…
Reference in New Issue
Block a user