|
|
b677e7 |
From c8b74ac5cf508c7bcec92d197880043af1d2bad7 Mon Sep 17 00:00:00 2001
|
|
|
b677e7 |
From: Lennart Poettering <lennart@poettering.net>
|
|
|
b677e7 |
Date: Tue, 9 Oct 2018 22:23:41 +0200
|
|
|
b677e7 |
Subject: [PATCH] logind: validate /run/user/1000 before we set it
|
|
|
b677e7 |
|
|
|
b677e7 |
Let's be safe than sorry, in particular as logind doesn't set it up
|
|
|
b677e7 |
anymore, but user-runtime-dir@.service does, and logind doesn't really
|
|
|
b677e7 |
track success of that.
|
|
|
b677e7 |
|
|
|
b677e7 |
(cherry picked from commit b92171124819305985ed292cc472f6668a027425)
|
|
|
b677e7 |
|
|
|
b677e7 |
Related: #1642460
|
|
|
b677e7 |
---
|
|
|
b677e7 |
src/login/pam_systemd.c | 48 +++++++++++++++++++++++++++++++++++------
|
|
|
b677e7 |
1 file changed, 41 insertions(+), 7 deletions(-)
|
|
|
b677e7 |
|
|
|
b677e7 |
diff --git a/src/login/pam_systemd.c b/src/login/pam_systemd.c
|
|
|
b677e7 |
index b2b62540bb..64e1b4d1bf 100644
|
|
|
b677e7 |
--- a/src/login/pam_systemd.c
|
|
|
b677e7 |
+++ b/src/login/pam_systemd.c
|
|
|
b677e7 |
@@ -319,6 +319,36 @@ static int update_environment(pam_handle_t *handle, const char *key, const char
|
|
|
b677e7 |
return r;
|
|
|
b677e7 |
}
|
|
|
b677e7 |
|
|
|
b677e7 |
+static bool validate_runtime_directory(pam_handle_t *handle, const char *path, uid_t uid) {
|
|
|
b677e7 |
+ struct stat st;
|
|
|
b677e7 |
+
|
|
|
b677e7 |
+ assert(path);
|
|
|
b677e7 |
+
|
|
|
b677e7 |
+ /* Just some extra paranoia: let's not set $XDG_RUNTIME_DIR if the directory we'd set it to isn't actually set
|
|
|
b677e7 |
+ * up properly for us. */
|
|
|
b677e7 |
+
|
|
|
b677e7 |
+ if (lstat(path, &st) < 0) {
|
|
|
b677e7 |
+ pam_syslog(handle, LOG_ERR, "Failed to stat() runtime directory '%s': %s", path, strerror(errno));
|
|
|
b677e7 |
+ goto fail;
|
|
|
b677e7 |
+ }
|
|
|
b677e7 |
+
|
|
|
b677e7 |
+ if (!S_ISDIR(st.st_mode)) {
|
|
|
b677e7 |
+ pam_syslog(handle, LOG_ERR, "Runtime directory '%s' is not actually a directory.", path);
|
|
|
b677e7 |
+ goto fail;
|
|
|
b677e7 |
+ }
|
|
|
b677e7 |
+
|
|
|
b677e7 |
+ if (st.st_uid != uid) {
|
|
|
b677e7 |
+ pam_syslog(handle, LOG_ERR, "Runtime directory '%s' is not owned by UID " UID_FMT ", as it should.", path, uid);
|
|
|
b677e7 |
+ goto fail;
|
|
|
b677e7 |
+ }
|
|
|
b677e7 |
+
|
|
|
b677e7 |
+ return true;
|
|
|
b677e7 |
+
|
|
|
b677e7 |
+fail:
|
|
|
b677e7 |
+ pam_syslog(handle, LOG_WARNING, "Not setting $XDG_RUNTIME_DIR, as the directory is not in order.");
|
|
|
b677e7 |
+ return false;
|
|
|
b677e7 |
+}
|
|
|
b677e7 |
+
|
|
|
b677e7 |
_public_ PAM_EXTERN int pam_sm_open_session(
|
|
|
b677e7 |
pam_handle_t *handle,
|
|
|
b677e7 |
int flags,
|
|
|
b677e7 |
@@ -377,10 +407,12 @@ _public_ PAM_EXTERN int pam_sm_open_session(
|
|
|
b677e7 |
if (asprintf(&rt, "/run/user/"UID_FMT, pw->pw_uid) < 0)
|
|
|
b677e7 |
return PAM_BUF_ERR;
|
|
|
b677e7 |
|
|
|
b677e7 |
- r = pam_misc_setenv(handle, "XDG_RUNTIME_DIR", rt, 0);
|
|
|
b677e7 |
- if (r != PAM_SUCCESS) {
|
|
|
b677e7 |
- pam_syslog(handle, LOG_ERR, "Failed to set runtime dir.");
|
|
|
b677e7 |
- return r;
|
|
|
b677e7 |
+ if (validate_runtime_directory(handle, rt, pw->pw_uid)) {
|
|
|
b677e7 |
+ r = pam_misc_setenv(handle, "XDG_RUNTIME_DIR", rt, 0);
|
|
|
b677e7 |
+ if (r != PAM_SUCCESS) {
|
|
|
b677e7 |
+ pam_syslog(handle, LOG_ERR, "Failed to set runtime dir.");
|
|
|
b677e7 |
+ return r;
|
|
|
b677e7 |
+ }
|
|
|
b677e7 |
}
|
|
|
b677e7 |
|
|
|
b677e7 |
r = export_legacy_dbus_address(handle, pw->pw_uid, rt);
|
|
|
b677e7 |
@@ -584,9 +616,11 @@ _public_ PAM_EXTERN int pam_sm_open_session(
|
|
|
b677e7 |
* in privileged apps clobbering the runtime directory
|
|
|
b677e7 |
* unnecessarily. */
|
|
|
b677e7 |
|
|
|
b677e7 |
- r = update_environment(handle, "XDG_RUNTIME_DIR", runtime_path);
|
|
|
b677e7 |
- if (r != PAM_SUCCESS)
|
|
|
b677e7 |
- return r;
|
|
|
b677e7 |
+ if (validate_runtime_directory(handle, runtime_path, pw->pw_uid)) {
|
|
|
b677e7 |
+ r = update_environment(handle, "XDG_RUNTIME_DIR", runtime_path);
|
|
|
b677e7 |
+ if (r != PAM_SUCCESS)
|
|
|
b677e7 |
+ return r;
|
|
|
b677e7 |
+ }
|
|
|
b677e7 |
|
|
|
b677e7 |
r = export_legacy_dbus_address(handle, pw->pw_uid, runtime_path);
|
|
|
b677e7 |
if (r != PAM_SUCCESS)
|