]> git.ipfire.org Git - thirdparty/libvirt.git/commit
locking: restrict sockets to mode 0600
authorDaniel P. Berrangé <berrange@redhat.com>
Tue, 30 Apr 2019 15:51:37 +0000 (16:51 +0100)
committerDaniel P. Berrangé <berrange@redhat.com>
Tue, 21 May 2019 12:30:09 +0000 (13:30 +0100)
commit13d340b328ad2d567f2878cfeedacd114a9172a7
treef35a4cded1515920d6138d85359e3b992a2be5ca
parentebc49c1dff2fc1999963dd225c3f9a7beb90e87b
locking: restrict sockets to mode 0600

The virtlockd daemon's only intended client is the libvirtd daemon. As
such it should never allow clients from other user accounts to connect.
The code already enforces this and drops clients from other UIDs, but
we can get earlier (and thus stronger) protection against DoS by setting
the socket permissions to 0600

Fixes CVE-2019-10132

Reviewed-by: Ján Tomko <jtomko@redhat.com>
Signed-off-by: Daniel P. Berrangé <berrange@redhat.com>
(cherry picked from commit f111e09468693909b1f067aa575efdafd9a262a1)
src/locking/virtlockd-admin.socket.in
src/locking/virtlockd.socket.in