diff options
author | Denys Vlasenko <vda.linux@googlemail.com> | 2016-11-03 22:13:08 +0100 |
---|---|---|
committer | Denys Vlasenko <vda.linux@googlemail.com> | 2016-11-03 22:13:08 +0100 |
commit | 79e2598c48ad7e41d523f62368454c7d74f48268 (patch) | |
tree | b061ea33e433dcd509a99dc9726251f2e0f785e5 | |
parent | 2b288236e80938d29324072a823f46861bd07cd3 (diff) | |
download | busybox-w32-79e2598c48ad7e41d523f62368454c7d74f48268.tar.gz busybox-w32-79e2598c48ad7e41d523f62368454c7d74f48268.tar.bz2 busybox-w32-79e2598c48ad7e41d523f62368454c7d74f48268.zip |
su: expand help; simplify passing of -c CMD to run_shell()
Also, added a comment about bug 9401 (TIOCSTI input injection).
function old new delta
packed_usage 30909 30932 +23
su_main 470 487 +17
sulogin_main 260 258 -2
run_applet_and_exit 681 678 -3
run_shell 166 126 -40
Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com>
-rw-r--r-- | include/libbb.h | 2 | ||||
-rw-r--r-- | libbb/executable.c | 2 | ||||
-rw-r--r-- | libbb/run_shell.c | 29 | ||||
-rw-r--r-- | loginutils/login.c | 2 | ||||
-rw-r--r-- | loginutils/su.c | 33 | ||||
-rw-r--r-- | loginutils/sulogin.c | 2 |
6 files changed, 45 insertions, 25 deletions
diff --git a/include/libbb.h b/include/libbb.h index 3752df982..20fc7329f 100644 --- a/include/libbb.h +++ b/include/libbb.h | |||
@@ -1341,7 +1341,7 @@ char *bb_simplify_abs_path_inplace(char *path) FAST_FUNC; | |||
1341 | #endif | 1341 | #endif |
1342 | extern void bb_do_delay(int seconds) FAST_FUNC; | 1342 | extern void bb_do_delay(int seconds) FAST_FUNC; |
1343 | extern void change_identity(const struct passwd *pw) FAST_FUNC; | 1343 | extern void change_identity(const struct passwd *pw) FAST_FUNC; |
1344 | extern void run_shell(const char *shell, int loginshell, const char *command, const char **additional_args) NORETURN FAST_FUNC; | 1344 | extern void run_shell(const char *shell, int loginshell, const char **args) NORETURN FAST_FUNC; |
1345 | 1345 | ||
1346 | /* Returns $SHELL, getpwuid(getuid())->pw_shell, or DEFAULT_SHELL. | 1346 | /* Returns $SHELL, getpwuid(getuid())->pw_shell, or DEFAULT_SHELL. |
1347 | * Note that getpwuid result might need xstrdup'ing | 1347 | * Note that getpwuid result might need xstrdup'ing |
diff --git a/libbb/executable.c b/libbb/executable.c index 05e70312f..3a1d4ff44 100644 --- a/libbb/executable.c +++ b/libbb/executable.c | |||
@@ -97,5 +97,5 @@ void FAST_FUNC exec_prog_or_SHELL(char **argv) | |||
97 | if (argv[0]) { | 97 | if (argv[0]) { |
98 | BB_EXECVP_or_die(argv); | 98 | BB_EXECVP_or_die(argv); |
99 | } | 99 | } |
100 | run_shell(getenv("SHELL"), /*login:*/ 1, NULL, NULL); | 100 | run_shell(getenv("SHELL"), /*login:*/ 1, NULL); |
101 | } | 101 | } |
diff --git a/libbb/run_shell.c b/libbb/run_shell.c index 4d92c3caa..b6b9360e8 100644 --- a/libbb/run_shell.c +++ b/libbb/run_shell.c | |||
@@ -50,19 +50,17 @@ void FAST_FUNC set_current_security_context(security_context_t sid) | |||
50 | #endif | 50 | #endif |
51 | 51 | ||
52 | /* Run SHELL, or DEFAULT_SHELL if SHELL is "" or NULL. | 52 | /* Run SHELL, or DEFAULT_SHELL if SHELL is "" or NULL. |
53 | * If COMMAND is nonzero, pass it to the shell with the -c option. | 53 | * If ADDITIONAL_ARGS is not NULL, pass them to the shell. |
54 | * If ADDITIONAL_ARGS is nonzero, pass it to the shell as more | 54 | */ |
55 | * arguments. */ | 55 | void FAST_FUNC run_shell(const char *shell, int loginshell, const char **additional_args) |
56 | void FAST_FUNC run_shell(const char *shell, int loginshell, const char *command, const char **additional_args) | ||
57 | { | 56 | { |
58 | const char **args; | 57 | const char **args; |
59 | int argno; | ||
60 | int additional_args_cnt = 0; | ||
61 | 58 | ||
62 | for (args = additional_args; args && *args; args++) | 59 | args = additional_args; |
63 | additional_args_cnt++; | 60 | while (args && *args) |
61 | args++; | ||
64 | 62 | ||
65 | args = xmalloc(sizeof(char*) * (4 + additional_args_cnt)); | 63 | args = xmalloc(sizeof(char*) * (2 + (args - additional_args))); |
66 | 64 | ||
67 | if (!shell || !shell[0]) | 65 | if (!shell || !shell[0]) |
68 | shell = DEFAULT_SHELL; | 66 | shell = DEFAULT_SHELL; |
@@ -70,16 +68,13 @@ void FAST_FUNC run_shell(const char *shell, int loginshell, const char *command, | |||
70 | args[0] = bb_get_last_path_component_nostrip(shell); | 68 | args[0] = bb_get_last_path_component_nostrip(shell); |
71 | if (loginshell) | 69 | if (loginshell) |
72 | args[0] = xasprintf("-%s", args[0]); | 70 | args[0] = xasprintf("-%s", args[0]); |
73 | argno = 1; | 71 | args[1] = NULL; |
74 | if (command) { | ||
75 | args[argno++] = "-c"; | ||
76 | args[argno++] = command; | ||
77 | } | ||
78 | if (additional_args) { | 72 | if (additional_args) { |
79 | for (; *additional_args; ++additional_args) | 73 | int cnt = 1; |
80 | args[argno++] = *additional_args; | 74 | for (;;) |
75 | if ((args[cnt++] = *additional_args++) == NULL) | ||
76 | break; | ||
81 | } | 77 | } |
82 | args[argno] = NULL; | ||
83 | 78 | ||
84 | #if ENABLE_SELINUX | 79 | #if ENABLE_SELINUX |
85 | if (current_sid) | 80 | if (current_sid) |
diff --git a/loginutils/login.c b/loginutils/login.c index 94b6c45db..52abc1886 100644 --- a/loginutils/login.c +++ b/loginutils/login.c | |||
@@ -618,7 +618,7 @@ int login_main(int argc UNUSED_PARAM, char **argv) | |||
618 | signal(SIGINT, SIG_DFL); | 618 | signal(SIGINT, SIG_DFL); |
619 | 619 | ||
620 | /* Exec login shell with no additional parameters */ | 620 | /* Exec login shell with no additional parameters */ |
621 | run_shell(pw->pw_shell, 1, NULL, NULL); | 621 | run_shell(pw->pw_shell, 1, NULL); |
622 | 622 | ||
623 | /* return EXIT_FAILURE; - not reached */ | 623 | /* return EXIT_FAILURE; - not reached */ |
624 | } | 624 | } |
diff --git a/loginutils/su.c b/loginutils/su.c index 3c0e8c100..24ffbde86 100644 --- a/loginutils/su.c +++ b/loginutils/su.c | |||
@@ -31,10 +31,10 @@ | |||
31 | //kbuild:lib-$(CONFIG_SU) += su.o | 31 | //kbuild:lib-$(CONFIG_SU) += su.o |
32 | 32 | ||
33 | //usage:#define su_trivial_usage | 33 | //usage:#define su_trivial_usage |
34 | //usage: "[OPTIONS] [-] [USER]" | 34 | //usage: "[-lmp] [-] [-s SH] [USER [SCRIPT ARGS / -c 'CMD' ARG0 ARGS]]" |
35 | //usage:#define su_full_usage "\n\n" | 35 | //usage:#define su_full_usage "\n\n" |
36 | //usage: "Run shell under USER (by default, root)\n" | 36 | //usage: "Run shell under USER (by default, root)\n" |
37 | //usage: "\n -,-l Clear environment, run shell as login shell" | 37 | //usage: "\n -,-l Clear environment, go to home dir, run shell as login shell" |
38 | //usage: "\n -p,-m Do not set new $HOME, $SHELL, $USER, $LOGNAME" | 38 | //usage: "\n -p,-m Do not set new $HOME, $SHELL, $USER, $LOGNAME" |
39 | //usage: "\n -c CMD Command to pass to 'sh -c'" | 39 | //usage: "\n -c CMD Command to pass to 'sh -c'" |
40 | //usage: "\n -s SH Shell to use instead of user's default" | 40 | //usage: "\n -s SH Shell to use instead of user's default" |
@@ -81,8 +81,12 @@ int su_main(int argc UNUSED_PARAM, char **argv) | |||
81 | #endif | 81 | #endif |
82 | const char *old_user; | 82 | const char *old_user; |
83 | 83 | ||
84 | /* Note: we don't use "'+': stop at first non-option" idiom here. | ||
85 | * For su, "SCRIPT ARGS" or "-c CMD ARGS" do not stop option parsing: | ||
86 | * ARGS starting with dash will be treated as su options, | ||
87 | * not passed to shell. (Tested on util-linux 2.28). | ||
88 | */ | ||
84 | flags = getopt32(argv, "mplc:s:", &opt_command, &opt_shell); | 89 | flags = getopt32(argv, "mplc:s:", &opt_command, &opt_shell); |
85 | //argc -= optind; | ||
86 | argv += optind; | 90 | argv += optind; |
87 | 91 | ||
88 | if (argv[0] && LONE_DASH(argv[0])) { | 92 | if (argv[0] && LONE_DASH(argv[0])) { |
@@ -162,8 +166,29 @@ int su_main(int argc UNUSED_PARAM, char **argv) | |||
162 | pw); | 166 | pw); |
163 | IF_SELINUX(set_current_security_context(NULL);) | 167 | IF_SELINUX(set_current_security_context(NULL);) |
164 | 168 | ||
169 | if (opt_command) { | ||
170 | *--argv = opt_command; | ||
171 | *--argv = (char*)"-c"; | ||
172 | } | ||
173 | |||
174 | /* A nasty ioctl exists which can stuff data into input queue: | ||
175 | * #include <sys/ioctl.h> | ||
176 | * int main() { | ||
177 | * const char *msg = "echo $UID\n"; | ||
178 | * while (*msg) ioctl(0, TIOCSTI, *msg++); | ||
179 | * return 0; | ||
180 | * } | ||
181 | * With "su USER -c EXPLOIT" run by root, exploit can make root shell | ||
182 | * read as input and execute arbitrary command. | ||
183 | * It's debatable whether we need to protect against this | ||
184 | * (root may hesitate to run unknown scripts interactively). | ||
185 | * | ||
186 | * Some versions of su run -c CMD in a different session: | ||
187 | * ioctl(TIOCSTI) works only on the controlling tty. | ||
188 | */ | ||
189 | |||
165 | /* Never returns */ | 190 | /* Never returns */ |
166 | run_shell(opt_shell, flags & SU_OPT_l, opt_command, (const char**)argv); | 191 | run_shell(opt_shell, flags & SU_OPT_l, (const char**)argv); |
167 | 192 | ||
168 | /* return EXIT_FAILURE; - not reached */ | 193 | /* return EXIT_FAILURE; - not reached */ |
169 | } | 194 | } |
diff --git a/loginutils/sulogin.c b/loginutils/sulogin.c index 6befea933..2e32e2bbd 100644 --- a/loginutils/sulogin.c +++ b/loginutils/sulogin.c | |||
@@ -89,5 +89,5 @@ int sulogin_main(int argc UNUSED_PARAM, char **argv) | |||
89 | shell = pwd->pw_shell; | 89 | shell = pwd->pw_shell; |
90 | 90 | ||
91 | /* Exec login shell with no additional parameters. Never returns. */ | 91 | /* Exec login shell with no additional parameters. Never returns. */ |
92 | run_shell(shell, 1, NULL, NULL); | 92 | run_shell(shell, 1, NULL); |
93 | } | 93 | } |