diff options
author | Justus Winter <justus@gnupg.org> | 2017-06-20 01:06:53 +0200 |
---|---|---|
committer | Justus Winter <justus@gnupg.org> | 2017-06-20 12:24:54 +0200 |
commit | 9d1b0cfb95e26fa506179bc30152989a817ff1e6 (patch) | |
tree | 6bb27c4359c97ff8f4f1edd078d966522e97b0a4 /trans | |
parent | a4f5b76390f1c7b377efbac488b57fa6756da80a (diff) | |
download | hurd-9d1b0cfb95e26fa506179bc30152989a817ff1e6.tar.gz hurd-9d1b0cfb95e26fa506179bc30152989a817ff1e6.tar.bz2 hurd-9d1b0cfb95e26fa506179bc30152989a817ff1e6.zip |
trans/fakeroot: Obey O_NOFOLLOW.
* trans/fakeroot.c (netfs_S_dir_lookup): Do not follow symlinks if the
client used O_NOFOLLOW.
Diffstat (limited to 'trans')
-rw-r--r-- | trans/fakeroot.c | 60 |
1 files changed, 59 insertions, 1 deletions
diff --git a/trans/fakeroot.c b/trans/fakeroot.c index ad7bec98..0571c3e5 100644 --- a/trans/fakeroot.c +++ b/trans/fakeroot.c @@ -302,16 +302,74 @@ netfs_S_dir_lookup (struct protid *diruser, dnp = diruser->po->np; + /* See glibc's lookup-retry.c about O_NOFOLLOW. */ + if (flags & O_NOFOLLOW) + flags |= O_NOTRANS; + mach_port_t dir = netfs_node_netnode (dnp)->file; redo_lookup: err = dir_lookup (dir, filename, - flags & (O_NOLINK|O_RDWR|O_EXEC|O_CREAT|O_EXCL|O_NONBLOCK), + flags & (O_NOFOLLOW|O_NOTRANS|O_NOLINK + |O_RDWR|O_EXEC|O_CREAT|O_EXCL|O_NONBLOCK), real_from_fake_mode (mode), do_retry, retry_name, &file); if (dir != netfs_node_netnode (dnp)->file) mach_port_deallocate (mach_task_self (), dir); if (err) return err; + /* See glibc's lookup-retry.c about O_NOFOLLOW. */ + if (flags & O_NOFOLLOW + && (*do_retry == FS_RETRY_NORMAL && *retry_name == 0)) + { + /* In Linux, O_NOFOLLOW means to reject symlinks. If we + did an O_NOLINK lookup above and io_stat here to check + for S_IFLNK, a translator like firmlink could easily + spoof this check by not showing S_IFLNK, but in fact + redirecting the lookup to some other name + (i.e. opening the very same holes a symlink would). + + Instead we do an O_NOTRANS lookup above, and stat the + underlying node: if it has a translator set, and its + owner is not root (st_uid 0) then we reject it. + Since the motivation for this feature is security, and + that security presumes we trust the containing + directory, this check approximates the security of + refusing symlinks while accepting mount points. + Note that we actually permit something Linux doesn't: + we follow root-owned symlinks; if that is deemed + undesireable, we can add a final check for that + one exception to our general translator-based rule. */ + struct stat st; + err = io_stat (file, &st); + if (!err + && (st.st_mode & (S_IPTRANS|S_IATRANS))) + { + if (st.st_uid != 0) + err = ENOENT; + else if (st.st_mode & S_IPTRANS) + { + char buf[1024]; /* XXX */ + char *trans = buf; + size_t translen = sizeof buf; + err = file_get_translator (file, + &trans, &translen); + if (!err + && translen > sizeof _HURD_SYMLINK + && !memcmp (trans, + _HURD_SYMLINK, sizeof _HURD_SYMLINK)) + err = ENOENT; + + if (trans != buf) + vm_deallocate (mach_task_self (), (vm_address_t) trans, translen); + } + } + if (err) + { + mach_port_deallocate (mach_task_self (), file); + return err; + } + } + switch (*do_retry) { case FS_RETRY_REAUTH: |