Blame SOURCES/0014-Better-check-for-sessions.patch

39f53b
From dc4d1b8e3e315933c82b23b2806a9cf973e78e78 Mon Sep 17 00:00:00 2001
39f53b
From: Frediano Ziglio <freddy77@gmail.com>
39f53b
Date: Mon, 21 Sep 2020 07:06:09 +0100
39f53b
Subject: [PATCH vd_agent_linux 14/17] Better check for sessions
39f53b
39f53b
Do not allow other users to hijack a session checking that
39f53b
the process is launched by the owner of the session.
39f53b
39f53b
Signed-off-by: Frediano Ziglio <freddy77@gmail.com>
39f53b
Acked-by: Uri Lublin <uril@redhat.com>
39f53b
---
39f53b
 src/vdagentd/console-kit.c        | 67 +++++++++++++++++++++++++++++++
39f53b
 src/vdagentd/dummy-session-info.c |  5 +++
39f53b
 src/vdagentd/session-info.h       |  3 ++
39f53b
 src/vdagentd/systemd-login.c      |  9 +++++
39f53b
 src/vdagentd/vdagentd.c           | 10 ++++-
39f53b
 5 files changed, 93 insertions(+), 1 deletion(-)
39f53b
39f53b
diff --git a/src/vdagentd/console-kit.c b/src/vdagentd/console-kit.c
39f53b
index fc630f1..09a8402 100644
39f53b
--- a/src/vdagentd/console-kit.c
39f53b
+++ b/src/vdagentd/console-kit.c
39f53b
@@ -568,3 +568,70 @@ exit:
39f53b
     }
39f53b
     return ret;
39f53b
 }
39f53b
+
39f53b
+uid_t session_info_uid_for_session(struct session_info *info, const char *session)
39f53b
+{
39f53b
+    DBusError error;
39f53b
+    DBusMessage *message = NULL;
39f53b
+    DBusMessage *reply = NULL;
39f53b
+    uint32_t uid;
39f53b
+    uid_t ret = -1;
39f53b
+    const char *err_msg;
39f53b
+
39f53b
+    g_return_val_if_fail(info != NULL, ret);
39f53b
+    g_return_val_if_fail(info->connection != NULL, ret);
39f53b
+    g_return_val_if_fail(info->active_session != NULL, ret);
39f53b
+
39f53b
+    dbus_error_init(&error);
39f53b
+
39f53b
+    err_msg = "(console-kit) Unable to create dbus message for GetUnixUser";
39f53b
+    message = dbus_message_new_method_call(INTERFACE_CONSOLE_KIT,
39f53b
+                                           session,
39f53b
+                                           INTERFACE_CONSOLE_KIT_SESSION,
39f53b
+                                           "GetUnixUser");
39f53b
+    if (message == NULL) {
39f53b
+        goto exit;
39f53b
+    }
39f53b
+
39f53b
+    err_msg = "(console-kit) GetUnixUser failed";
39f53b
+    reply = dbus_connection_send_with_reply_and_block(info->connection,
39f53b
+                                                      message,
39f53b
+                                                      -1,
39f53b
+                                                      &error);
39f53b
+    if (reply == NULL || dbus_error_is_set(&error)) {
39f53b
+        goto exit;
39f53b
+    }
39f53b
+
39f53b
+    dbus_error_init(&error);
39f53b
+    err_msg = "(console-kit) fail to get session-type from reply";
39f53b
+    if (!dbus_message_get_args(reply,
39f53b
+                               &error,
39f53b
+                               DBUS_TYPE_UINT32, &uid,
39f53b
+                               DBUS_TYPE_INVALID)) {
39f53b
+        goto exit;
39f53b
+    }
39f53b
+
39f53b
+    if (info->verbose) {
39f53b
+        syslog(LOG_DEBUG, "(console-kit) unix user is '%u'", (unsigned) uid);
39f53b
+    }
39f53b
+
39f53b
+    err_msg = NULL;
39f53b
+    ret = uid;
39f53b
+
39f53b
+exit:
39f53b
+    if (err_msg) {
39f53b
+        if (dbus_error_is_set(&error)) {
39f53b
+            syslog(LOG_ERR, "%s: %s", err_msg, error.message);
39f53b
+            dbus_error_free(&error);
39f53b
+        } else {
39f53b
+            syslog(LOG_ERR, "%s", err_msg);
39f53b
+        }
39f53b
+    }
39f53b
+    if (reply != NULL) {
39f53b
+        dbus_message_unref(reply);
39f53b
+    }
39f53b
+    if (message != NULL) {
39f53b
+        dbus_message_unref(message);
39f53b
+    }
39f53b
+    return ret;
39f53b
+}
39f53b
diff --git a/src/vdagentd/dummy-session-info.c b/src/vdagentd/dummy-session-info.c
39f53b
index 7fd1eea..137c01a 100644
39f53b
--- a/src/vdagentd/dummy-session-info.c
39f53b
+++ b/src/vdagentd/dummy-session-info.c
39f53b
@@ -55,3 +55,8 @@ gboolean session_info_session_is_locked(G_GNUC_UNUSED struct session_info *si)
39f53b
 {
39f53b
     return FALSE;
39f53b
 }
39f53b
+
39f53b
+uid_t session_info_uid_for_session(struct session_info *si, const char *session)
39f53b
+{
39f53b
+    return -1;
39f53b
+}
39f53b
diff --git a/src/vdagentd/session-info.h b/src/vdagentd/session-info.h
39f53b
index c8edb86..96aa8d3 100644
39f53b
--- a/src/vdagentd/session-info.h
39f53b
+++ b/src/vdagentd/session-info.h
39f53b
@@ -40,4 +40,7 @@ char *session_info_session_for_pid(struct session_info *ck, uint32_t pid);
39f53b
 gboolean session_info_session_is_locked(struct session_info *si);
39f53b
 gboolean session_info_is_user(struct session_info *si);
39f53b
 
39f53b
+/* get owner of a given session */
39f53b
+uid_t session_info_uid_for_session(struct session_info *si, const char *session);
39f53b
+
39f53b
 #endif
39f53b
diff --git a/src/vdagentd/systemd-login.c b/src/vdagentd/systemd-login.c
39f53b
index 0b8f3c1..0e1ff3f 100644
39f53b
--- a/src/vdagentd/systemd-login.c
39f53b
+++ b/src/vdagentd/systemd-login.c
39f53b
@@ -392,3 +392,12 @@ gboolean session_info_is_user(struct session_info *si)
39f53b
 
39f53b
     return ret;
39f53b
 }
39f53b
+
39f53b
+uid_t session_info_uid_for_session(struct session_info *si, const char *session)
39f53b
+{
39f53b
+    uid_t ret = -1;
39f53b
+    if (sd_session_get_uid(session, &ret) < 0) {
39f53b
+        return -1;
39f53b
+    }
39f53b
+    return ret;
39f53b
+}
39f53b
diff --git a/src/vdagentd/vdagentd.c b/src/vdagentd/vdagentd.c
39f53b
index e98fbe5..bb39340 100644
39f53b
--- a/src/vdagentd/vdagentd.c
39f53b
+++ b/src/vdagentd/vdagentd.c
39f53b
@@ -991,12 +991,20 @@ static void agent_connect(UdscsConnection *conn)
39f53b
 
39f53b
         agent_data->session = session_info_session_for_pid(session_info, pid_uid.pid);
39f53b
 
39f53b
+        uid_t session_uid = session_info_uid_for_session(session_info, agent_data->session);
39f53b
+
39f53b
         /* Check that the UID of the PID did not change, this should be done after
39f53b
          * computing the session to avoid race conditions.
39f53b
          * This can happen as vdagent_connection_get_peer_pid_uid get information
39f53b
          * from the time of creating the socket, but the process in the meantime
39f53b
          * have been replaced */
39f53b
-        if (!check_uid_of_pid(pid_uid.pid, pid_uid.uid)) {
39f53b
+        if (!check_uid_of_pid(pid_uid.pid, pid_uid.uid) ||
39f53b
+            /* Check that the user launching the Agent is the same as session one
39f53b
+             * or root user.
39f53b
+             * This prevents session hijacks from other users. */
39f53b
+            (pid_uid.uid != 0 && pid_uid.uid != session_uid)) {
39f53b
+            syslog(LOG_ERR, "UID mismatch: UID=%u PID=%u suid=%u", pid_uid.uid,
39f53b
+                   pid_uid.pid, session_uid);
39f53b
             agent_data_destroy(agent_data);
39f53b
             udscs_server_destroy_connection(server, conn);
39f53b
             return;
39f53b
-- 
39f53b
2.26.2
39f53b