6f381c
From 004130ae74688eb321aadc05192bab69fe5cbcbf Mon Sep 17 00:00:00 2001
6f381c
From: =?UTF-8?q?Zbigniew=20J=C4=99drzejewski-Szmek?= <zbyszek@in.waw.pl>
6f381c
Date: Fri, 22 Jul 2022 11:45:12 +0200
6f381c
Subject: [PATCH] manager: limit access to private dbus socket
6f381c
6f381c
For the system manager, /run/systemd/private is publicly accessible, because
6f381c
/run/systemd is 0755, and /run/systemd/private is 0777. For the user manager,
6f381c
/run/user/<uid> is 0700, and /run/user/<uid>/systemd/private is 0777. This
6f381c
does not directly cause any security issue because we check the sender in
6f381c
bus_check_peercred (ucred.uid != 0 && ucred.uid != geteuid()).
6f381c
6f381c
But it makes sense to limit access to the socket to avoid wasting time in PID1.
6f381c
Somebody could send messages there that'd we'd reject anyway. It also makes
6f381c
things more explicit.
6f381c
6f381c
(cherry picked from commit df1cbd1adf26071aab41d96e054452a3d66103a4)
6f381c
6f381c
Resolves: #2119405
6f381c
---
6f381c
 src/core/dbus.c | 4 +++-
6f381c
 1 file changed, 3 insertions(+), 1 deletion(-)
6f381c
6f381c
diff --git a/src/core/dbus.c b/src/core/dbus.c
6f381c
index 66d838cdb4..ec6c52cb85 100644
6f381c
--- a/src/core/dbus.c
6f381c
+++ b/src/core/dbus.c
6f381c
@@ -42,6 +42,7 @@
6f381c
 #include "string-util.h"
6f381c
 #include "strv.h"
6f381c
 #include "strxcpyx.h"
6f381c
+#include "umask-util.h"
6f381c
 #include "user-util.h"
6f381c
 
6f381c
 #define CONNECTIONS_MAX 4096
6f381c
@@ -1019,7 +1020,8 @@ int bus_init_private(Manager *m) {
6f381c
         if (fd < 0)
6f381c
                 return log_error_errno(errno, "Failed to allocate private socket: %m");
6f381c
 
6f381c
-        r = bind(fd, &sa.sa, salen);
6f381c
+        RUN_WITH_UMASK(0077)
6f381c
+                r = bind(fd, &sa.sa, salen);
6f381c
         if (r < 0)
6f381c
                 return log_error_errno(errno, "Failed to bind private socket: %m");
6f381c