diff options
author | Kaz Kylheku <kaz@kylheku.com> | 2016-05-01 21:57:23 -0700 |
---|---|---|
committer | Kaz Kylheku <kaz@kylheku.com> | 2016-05-01 21:57:23 -0700 |
commit | 112aa0b16bcc53b06633dfb9878194f6d59ada4d (patch) | |
tree | 257e222223c12972ced5debe4709c9196694e972 /sysif.c | |
parent | 7f1562fbf9262270b31d1007e400dd6605d81f99 (diff) | |
download | txr-112aa0b16bcc53b06633dfb9878194f6d59ada4d.tar.gz txr-112aa0b16bcc53b06633dfb9878194f6d59ada4d.tar.bz2 txr-112aa0b16bcc53b06633dfb9878194f6d59ada4d.zip |
Fix somewhat broken setuid privilege dropping.
* sysif.c (repress_privilege): Eliminate redundant
getuid call.
(drop_privilege): On some platforms,
setuid(getuid()) will not drop setuid non-root privilege. This
is fixed by using setresuid, if we have it, which we do on
Linux. On platforms where we don't have setresuid,
we try setuid(getuid()). Then after that if we are able
to change our effective user ID to the one we dropped,
we conclude that it didn't work and abort.
(simulate_setuid): Call drop_privilege instead of
repeating the naive privilege-dropping logic.
Check the result of seteuid; if it fails, then
drop privilege! Otherwise a txr that is setuid bob
will continue running as bob, if it fails to enact
setuid on a script owned by alice.
* txr.1: Rewrite SETUID OPERATION section in an attempt
to clarify the wording, fix formatting issues, and
describe the current implemenation of privilege dropping.
Diffstat (limited to 'sysif.c')
-rw-r--r-- | sysif.c | 47 |
1 files changed, 41 insertions, 6 deletions
@@ -902,7 +902,7 @@ void repress_privilege(void) orig_euid = geteuid(); if (real_uid != orig_euid) - seteuid(getuid()); + seteuid(real_uid); else is_setuid = 0; @@ -911,8 +911,44 @@ void repress_privilege(void) void drop_privilege(void) { - if (repress_called != RC_MAGIC || (is_setuid && setuid(getuid()) != 0)) + /* Bug: repress_privilege wasn't called. */ + if (repress_called != RC_MAGIC) abort(); + + if (!is_setuid) + return; + +#if HAVE_SETRESUID + { + if (setresuid(real_uid, real_uid, real_uid) != 0) + abort(); + return; + } +#else + { + /* First, try to regain as much privilege as possible. + * On some platforms, setuid requires the caller to be effective + * root in order to change the saved user ID. We don't want this + * call to fail just because we weren't effective root, even though + * we have the privilege to be effective root! + */ + (void) setuid(0); + + if (setuid(real_uid) == 0) { + if (orig_euid == 0) + return; + /* If we can re-gain the previous + * effective ID, then setuid(getuid()) + * didn't actually work; it didn't + * set the saved ID. + */ + if (real_uid != 0 && seteuid(orig_euid) == 0) + abort(); + } + + abort(); + } +#endif } void simulate_setuid(val open_script) @@ -934,14 +970,13 @@ void simulate_setuid(val open_script) abort(); if ((stb.st_mode & (S_ISUID | S_IXUSR)) == (S_ISUID | S_IXUSR)) { - seteuid(stb.st_uid); - return; + if (seteuid(stb.st_uid) == 0) + return; } } } - if (is_setuid) - setuid(real_uid); + drop_privilege(); } #endif |