SHA256
1
0
forked from pool/libvirt
libvirt/e37bd65f-logging-restrict-sockets-to-mode-0600.patch
James Fehlig 9b252d2501 Accepting request 704536 from home:jfehlig:branches:Virtualization
- admin: reject clients unless their UID matches the server UID
  CVE-2019-10132
  96f41cd7-admin-reject-clients.patch,
  f111e094-locking-restrict-sockets-to-mode-0600.patch,
  e37bd65f-logging-restrict-sockets-to-mode-0600.patch
  bsc#1134348

OBS-URL: https://build.opensuse.org/request/show/704536
OBS-URL: https://build.opensuse.org/package/show/Virtualization/libvirt?expand=0&rev=756
2019-05-21 17:48:44 +00:00

42 lines
1.5 KiB
Diff

commit e37bd65f9948c1185456b2cdaa3bd6e875af680f
Author: Daniel P. Berrangé <berrange@redhat.com>
Date: Tue Apr 30 17:27:41 2019 +0100
logging: restrict sockets to mode 0600
The virtlogd daemon's only intended client is the libvirtd daemon. As
such it should never allow clients from other user accounts to connect.
The code already enforces this and drops clients from other UIDs, but
we can get earlier (and thus stronger) protection against DoS by setting
the socket permissions to 0600
Fixes CVE-2019-10132
Reviewed-by: Ján Tomko <jtomko@redhat.com>
Signed-off-by: Daniel P. Berrangé <berrange@redhat.com>
Index: libvirt-5.3.0/src/logging/virtlogd-admin.socket.in
===================================================================
--- libvirt-5.3.0.orig/src/logging/virtlogd-admin.socket.in
+++ libvirt-5.3.0/src/logging/virtlogd-admin.socket.in
@@ -5,6 +5,7 @@ Before=libvirtd.service
[Socket]
ListenStream=@localstatedir@/run/libvirt/virtlogd-admin-sock
Service=virtlogd.service
+SocketMode=0600
[Install]
WantedBy=sockets.target
Index: libvirt-5.3.0/src/logging/virtlogd.socket.in
===================================================================
--- libvirt-5.3.0.orig/src/logging/virtlogd.socket.in
+++ libvirt-5.3.0/src/logging/virtlogd.socket.in
@@ -4,6 +4,7 @@ Before=libvirtd.service
[Socket]
ListenStream=@localstatedir@/run/libvirt/virtlogd-sock
+SocketMode=0600
[Install]
WantedBy=sockets.target