summaryrefslogtreecommitdiffstats
path: root/sysif.c
diff options
context:
space:
mode:
authorKaz Kylheku <kaz@kylheku.com>2016-05-01 21:57:23 -0700
committerKaz Kylheku <kaz@kylheku.com>2016-05-01 21:57:23 -0700
commit112aa0b16bcc53b06633dfb9878194f6d59ada4d (patch)
tree257e222223c12972ced5debe4709c9196694e972 /sysif.c
parent7f1562fbf9262270b31d1007e400dd6605d81f99 (diff)
downloadtxr-112aa0b16bcc53b06633dfb9878194f6d59ada4d.tar.gz
txr-112aa0b16bcc53b06633dfb9878194f6d59ada4d.tar.bz2
txr-112aa0b16bcc53b06633dfb9878194f6d59ada4d.zip
Fix somewhat broken setuid privilege dropping.
* sysif.c (repress_privilege): Eliminate redundant getuid call. (drop_privilege): On some platforms, setuid(getuid()) will not drop setuid non-root privilege. This is fixed by using setresuid, if we have it, which we do on Linux. On platforms where we don't have setresuid, we try setuid(getuid()). Then after that if we are able to change our effective user ID to the one we dropped, we conclude that it didn't work and abort. (simulate_setuid): Call drop_privilege instead of repeating the naive privilege-dropping logic. Check the result of seteuid; if it fails, then drop privilege! Otherwise a txr that is setuid bob will continue running as bob, if it fails to enact setuid on a script owned by alice. * txr.1: Rewrite SETUID OPERATION section in an attempt to clarify the wording, fix formatting issues, and describe the current implemenation of privilege dropping.
Diffstat (limited to 'sysif.c')
-rw-r--r--sysif.c47
1 files changed, 41 insertions, 6 deletions
diff --git a/sysif.c b/sysif.c
index cb0ae918..4394a422 100644
--- a/sysif.c
+++ b/sysif.c
@@ -902,7 +902,7 @@ void repress_privilege(void)
orig_euid = geteuid();
if (real_uid != orig_euid)
- seteuid(getuid());
+ seteuid(real_uid);
else
is_setuid = 0;
@@ -911,8 +911,44 @@ void repress_privilege(void)
void drop_privilege(void)
{
- if (repress_called != RC_MAGIC || (is_setuid && setuid(getuid()) != 0))
+ /* Bug: repress_privilege wasn't called. */
+ if (repress_called != RC_MAGIC)
abort();
+
+ if (!is_setuid)
+ return;
+
+#if HAVE_SETRESUID
+ {
+ if (setresuid(real_uid, real_uid, real_uid) != 0)
+ abort();
+ return;
+ }
+#else
+ {
+ /* First, try to regain as much privilege as possible.
+ * On some platforms, setuid requires the caller to be effective
+ * root in order to change the saved user ID. We don't want this
+ * call to fail just because we weren't effective root, even though
+ * we have the privilege to be effective root!
+ */
+ (void) setuid(0);
+
+ if (setuid(real_uid) == 0) {
+ if (orig_euid == 0)
+ return;
+ /* If we can re-gain the previous
+ * effective ID, then setuid(getuid())
+ * didn't actually work; it didn't
+ * set the saved ID.
+ */
+ if (real_uid != 0 && seteuid(orig_euid) == 0)
+ abort();
+ }
+
+ abort();
+ }
+#endif
}
void simulate_setuid(val open_script)
@@ -934,14 +970,13 @@ void simulate_setuid(val open_script)
abort();
if ((stb.st_mode & (S_ISUID | S_IXUSR)) == (S_ISUID | S_IXUSR)) {
- seteuid(stb.st_uid);
- return;
+ if (seteuid(stb.st_uid) == 0)
+ return;
}
}
}
- if (is_setuid)
- setuid(real_uid);
+ drop_privilege();
}
#endif