ryantimwilson / rpms / systemd

Forked from rpms/systemd a month ago
Clone
9fc0f6
From 281100560056e06f69d2cdb4dcc854bd3717734f Mon Sep 17 00:00:00 2001
9fc0f6
From: Michal Sekletar <msekleta@redhat.com>
9fc0f6
Date: Mon, 10 Feb 2014 17:41:32 +0100
9fc0f6
Subject: [PATCH] pam: do not set XDG_RUNTIME_DIR unconditionally
9fc0f6
9fc0f6
If the session's original user is not the same as the newly logged in one we
9fc0f6
will not set XDG_RUNTIME_DIR.
9fc0f6
9fc0f6
Patch based on upstream commit baae0358f349870544884e405e82e4be7d8add9f
9fc0f6
---
9fc0f6
 src/login/logind-dbus.c         |  2 ++
9fc0f6
 src/login/logind-session-dbus.c |  1 +
9fc0f6
 src/login/pam-module.c          | 52 ++++++++++++++++++++---------------------
9fc0f6
 3 files changed, 29 insertions(+), 26 deletions(-)
9fc0f6
9fc0f6
diff --git a/src/login/logind-dbus.c b/src/login/logind-dbus.c
9fc0f6
index bb85c7d..69e94aa 100644
9fc0f6
--- a/src/login/logind-dbus.c
9fc0f6
+++ b/src/login/logind-dbus.c
9fc0f6
@@ -90,6 +90,7 @@
9fc0f6
         "   <arg name=\"path\" type=\"o\" direction=\"out\"/>\n"        \
9fc0f6
         "   <arg name=\"runtime_path\" type=\"o\" direction=\"out\"/>\n" \
9fc0f6
         "   <arg name=\"fd\" type=\"h\" direction=\"out\"/>\n"          \
9fc0f6
+        "   <arg name=\"uid\" type=\"u\" direction=\"out\"/>\n"         \
9fc0f6
         "   <arg name=\"seat\" type=\"s\" direction=\"out\"/>\n"        \
9fc0f6
         "   <arg name=\"vtnr\" type=\"u\" direction=\"out\"/>\n"        \
9fc0f6
         "   <arg name=\"existing\" type=\"b\" direction=\"out\"/>\n"    \
9fc0f6
@@ -523,6 +524,7 @@ static int bus_manager_create_session(Manager *m, DBusMessage *message) {
9fc0f6
                                 DBUS_TYPE_OBJECT_PATH, &path,
9fc0f6
                                 DBUS_TYPE_STRING, &session->user->runtime_path,
9fc0f6
                                 DBUS_TYPE_UNIX_FD, &fifo_fd,
9fc0f6
+                                DBUS_TYPE_UINT32, &session->user->uid,
9fc0f6
                                 DBUS_TYPE_STRING, &cseat,
9fc0f6
                                 DBUS_TYPE_UINT32, &vtnr,
9fc0f6
                                 DBUS_TYPE_BOOLEAN, &exists,
9fc0f6
diff --git a/src/login/logind-session-dbus.c b/src/login/logind-session-dbus.c
9fc0f6
index be4e01c..86b0746 100644
9fc0f6
--- a/src/login/logind-session-dbus.c
9fc0f6
+++ b/src/login/logind-session-dbus.c
9fc0f6
@@ -755,6 +755,7 @@ int session_send_create_reply(Session *s, DBusError *error) {
9fc0f6
                                     DBUS_TYPE_OBJECT_PATH, &path,
9fc0f6
                                     DBUS_TYPE_STRING, &s->user->runtime_path,
9fc0f6
                                     DBUS_TYPE_UNIX_FD, &fifo_fd,
9fc0f6
+                                    DBUS_TYPE_UINT32, &s->user->uid,
9fc0f6
                                     DBUS_TYPE_STRING, &cseat,
9fc0f6
                                     DBUS_TYPE_UINT32, &vtnr,
9fc0f6
                                     DBUS_TYPE_BOOLEAN, &exists,
9fc0f6
diff --git a/src/login/pam-module.c b/src/login/pam-module.c
9fc0f6
index 02f1618..22d9733 100644
9fc0f6
--- a/src/login/pam-module.c
9fc0f6
+++ b/src/login/pam-module.c
9fc0f6
@@ -86,31 +86,24 @@ static int get_user_data(
9fc0f6
 
9fc0f6
         const char *username = NULL;
9fc0f6
         struct passwd *pw = NULL;
9fc0f6
-        uid_t uid;
9fc0f6
         int r;
9fc0f6
 
9fc0f6
         assert(handle);
9fc0f6
         assert(ret_username);
9fc0f6
         assert(ret_pw);
9fc0f6
 
9fc0f6
-        r = audit_loginuid_from_pid(0, &uid);
9fc0f6
-        if (r >= 0)
9fc0f6
-                pw = pam_modutil_getpwuid(handle, uid);
9fc0f6
-        else {
9fc0f6
-                r = pam_get_user(handle, &username, NULL);
9fc0f6
-                if (r != PAM_SUCCESS) {
9fc0f6
-                        pam_syslog(handle, LOG_ERR, "Failed to get user name.");
9fc0f6
-                        return r;
9fc0f6
-                }
9fc0f6
-
9fc0f6
-                if (isempty(username)) {
9fc0f6
-                        pam_syslog(handle, LOG_ERR, "User name not valid.");
9fc0f6
-                        return PAM_AUTH_ERR;
9fc0f6
-                }
9fc0f6
+        r = pam_get_user(handle, &username, NULL);
9fc0f6
+        if (r != PAM_SUCCESS) {
9fc0f6
+                pam_syslog(handle, LOG_ERR, "Failed to get user name.");
9fc0f6
+                return r;
9fc0f6
+        }
9fc0f6
 
9fc0f6
-                pw = pam_modutil_getpwnam(handle, username);
9fc0f6
+        if (isempty(username)) {
9fc0f6
+                pam_syslog(handle, LOG_ERR, "User name not valid.");
9fc0f6
+                return PAM_AUTH_ERR;
9fc0f6
         }
9fc0f6
 
9fc0f6
+        pw = pam_modutil_getpwnam(handle, username);
9fc0f6
         if (!pw) {
9fc0f6
                 pam_syslog(handle, LOG_ERR, "Failed to get user data.");
9fc0f6
                 return PAM_USER_UNKNOWN;
9fc0f6
@@ -123,16 +116,14 @@ static int get_user_data(
9fc0f6
 }
9fc0f6
 
9fc0f6
 static int get_seat_from_display(const char *display, const char **seat, uint32_t *vtnr) {
9fc0f6
-        _cleanup_free_ char *p = NULL;
9fc0f6
-        int r;
9fc0f6
+        _cleanup_free_ char *p = NULL, *tty=NULL;
9fc0f6
         _cleanup_close_ int fd = -1;
9fc0f6
         union sockaddr_union sa = {
9fc0f6
                 .un.sun_family = AF_UNIX,
9fc0f6
         };
9fc0f6
         struct ucred ucred;
9fc0f6
         socklen_t l;
9fc0f6
-        _cleanup_free_ char *tty = NULL;
9fc0f6
-        int v;
9fc0f6
+        int v, r;
9fc0f6
 
9fc0f6
         assert(display);
9fc0f6
         assert(vtnr);
9fc0f6
@@ -186,14 +177,14 @@ _public_ PAM_EXTERN int pam_sm_open_session(
9fc0f6
         bool debug = false;
9fc0f6
         const char *username, *id, *object_path, *runtime_path, *service = NULL, *tty = NULL, *display = NULL, *remote_user = NULL, *remote_host = NULL, *seat = NULL, *type = NULL, *class = NULL, *class_pam = NULL, *cvtnr = NULL;
9fc0f6
         DBusError error;
9fc0f6
-        uint32_t uid, pid;
9fc0f6
         DBusMessageIter iter;
9fc0f6
         int session_fd = -1;
9fc0f6
         DBusConnection *bus = NULL;
9fc0f6
         DBusMessage *m = NULL, *reply = NULL;
9fc0f6
         dbus_bool_t remote, existing;
9fc0f6
         int r;
9fc0f6
-        uint32_t vtnr = 0;
9fc0f6
+        uint32_t uid, pid, vtnr = 0;
9fc0f6
+        uid_t original_uid;
9fc0f6
 
9fc0f6
         assert(handle);
9fc0f6
 
9fc0f6
@@ -389,6 +380,7 @@ _public_ PAM_EXTERN int pam_sm_open_session(
9fc0f6
                                    DBUS_TYPE_OBJECT_PATH, &object_path,
9fc0f6
                                    DBUS_TYPE_STRING, &runtime_path,
9fc0f6
                                    DBUS_TYPE_UNIX_FD, &session_fd,
9fc0f6
+                                   DBUS_TYPE_UINT32, &original_uid,
9fc0f6
                                    DBUS_TYPE_STRING, &seat,
9fc0f6
                                    DBUS_TYPE_UINT32, &vtnr,
9fc0f6
                                    DBUS_TYPE_BOOLEAN, &existing,
9fc0f6
@@ -409,10 +401,18 @@ _public_ PAM_EXTERN int pam_sm_open_session(
9fc0f6
                 goto finish;
9fc0f6
         }
9fc0f6
 
9fc0f6
-        r = pam_misc_setenv(handle, "XDG_RUNTIME_DIR", runtime_path, 0);
9fc0f6
-        if (r != PAM_SUCCESS) {
9fc0f6
-                pam_syslog(handle, LOG_ERR, "Failed to set runtime dir.");
9fc0f6
-                goto finish;
9fc0f6
+        if (original_uid == pw->pw_uid) {
9fc0f6
+               /* Don't set $XDG_RUNTIME_DIR if the user we now
9fc0f6
+                * authenticated for does not match the original user
9fc0f6
+                * of the session. We do this in order not to result
9fc0f6
+                * in privileged apps clobbering the runtime directory
9fc0f6
+                * unnecessarily. */
9fc0f6
+
9fc0f6
+                r = pam_misc_setenv(handle, "XDG_RUNTIME_DIR", runtime_path, 0);
9fc0f6
+                if (r != PAM_SUCCESS) {
9fc0f6
+                        pam_syslog(handle, LOG_ERR, "Failed to set runtime dir.");
9fc0f6
+                        return r;
9fc0f6
+                }
9fc0f6
         }
9fc0f6
 
9fc0f6
         if (!isempty(seat)) {