X-Git-Url: http://git.hungrycats.org/cgi-bin/gitweb.cgi?a=blobdiff_plain;f=driver%2Fsetuid.c;h=72228a5244c7d4a2691f1bea99b7aca05777cebc;hb=447db08c956099b3b183886729108bf5b364c4b8;hp=83ad494e364edacfcb998ba30f578d1b62a7785b;hpb=df7adbee81405e2849728a24b498ad2117784b1f;p=xscreensaver diff --git a/driver/setuid.c b/driver/setuid.c index 83ad494e..72228a52 100644 --- a/driver/setuid.c +++ b/driver/setuid.c @@ -1,5 +1,5 @@ /* setuid.c --- management of runtime privileges. - * xscreensaver, Copyright (c) 1993-1998 Jamie Zawinski + * xscreensaver, Copyright (c) 1993-1998, 2005 Jamie Zawinski * * Permission to use, copy, modify, distribute, and sell this software and its * documentation for any purpose is hereby granted without fee, provided that @@ -41,7 +41,7 @@ uid_gid_string (uid_t uid, gid_t gid) struct group *g = 0; p = getpwuid (uid); g = getgrgid (gid); - sprintf (buf, "%s/%s (%ld/%ld)", + sprintf (buf, "%.100s/%.100s (%ld/%ld)", (p && p->pw_name ? p->pw_name : "???"), (g && g->gr_name ? g->gr_name : "???"), (long) uid, (long) gid); @@ -75,12 +75,13 @@ describe_uids (saver_info *si, FILE *out) static int -set_ids_by_name (struct passwd *p, struct group *g, char **message_ret) +set_ids_by_number (uid_t uid, gid_t gid, char **message_ret) { int uid_errno = 0; int gid_errno = 0; - uid_t uid = p->pw_uid; - gid_t gid = g->gr_gid; + int sgs_errno = 0; + struct passwd *p = getpwuid (uid); + struct group *g = getgrgid (gid); if (message_ret) *message_ret = 0; @@ -90,11 +91,16 @@ set_ids_by_name (struct passwd *p, struct group *g, char **message_ret) -1, then that would be Really Bad. Rumor further has it that such systems really ought to be using -2 for "nobody", since that works. So, if we get a uid (or gid, for good measure) of -1, switch to -2 - instead. + instead. Note that this must be done after we've looked up the + user/group names with getpwuid(-1) and/or getgrgid(-1). */ if (gid == (gid_t) -1) gid = (gid_t) -2; if (uid == (uid_t) -1) uid = (uid_t) -2; + errno = 0; + if (setgroups (1, &gid) < 0) + sgs_errno = errno ? errno : -1; + errno = 0; if (setgid (gid) != 0) gid_errno = errno ? errno : -1; @@ -103,11 +109,12 @@ set_ids_by_name (struct passwd *p, struct group *g, char **message_ret) if (setuid (uid) != 0) uid_errno = errno ? errno : -1; - if (uid_errno == 0 && gid_errno == 0) + if (uid_errno == 0 && gid_errno == 0 && sgs_errno == 0) { static char buf [1024]; - sprintf (buf, "changed uid/gid to %s/%s (%ld/%ld).", - p->pw_name, (g ? g->gr_name : "???"), + sprintf (buf, "changed uid/gid to %.100s/%.100s (%ld/%ld).", + (p && p->pw_name ? p->pw_name : "???"), + (g && g->gr_name ? g->gr_name : "???"), (long) uid, (long) gid); if (message_ret) *message_ret = buf; @@ -116,71 +123,55 @@ set_ids_by_name (struct passwd *p, struct group *g, char **message_ret) else { char buf [1024]; + if (sgs_errno) + { + sprintf (buf, "%s: couldn't setgroups to %.100s (%ld)", + blurb(), + (g && g->gr_name ? g->gr_name : "???"), + (long) gid); + if (sgs_errno == -1) + fprintf(stderr, "%s: unknown error\n", buf); + else + { + errno = sgs_errno; + perror(buf); + } + } + if (gid_errno) { - sprintf (buf, "%s: couldn't set gid to %s (%ld)", + sprintf (buf, "%s: couldn't set gid to %.100s (%ld)", blurb(), - (g ? g->gr_name : "???"), + (g && g->gr_name ? g->gr_name : "???"), (long) gid); if (gid_errno == -1) fprintf(stderr, "%s: unknown error\n", buf); else - perror(buf); + { + errno = gid_errno; + perror(buf); + } } if (uid_errno) { - sprintf (buf, "%s: couldn't set uid to %s (%ld)", + sprintf (buf, "%s: couldn't set uid to %.100s (%ld)", blurb(), - (p ? p->pw_name : "???"), + (p && p->pw_name ? p->pw_name : "???"), (long) uid); if (uid_errno == -1) fprintf(stderr, "%s: unknown error\n", buf); else - perror(buf); + { + errno = uid_errno; + perror(buf); + } } return -1; } } -static int -set_ids_by_number (uid_t uid, gid_t gid, char **message_ret) -{ - struct passwd *p; - struct group *g; - - errno = 0; - p = getpwuid (uid); - if (!p) - { - char buf [1024]; - sprintf (buf, "%s: error looking up name of user %d", blurb(), - (long) uid); - if (errno) - perror (buf); - else - fprintf (stderr, "%s: unknown error.\n", buf); - return -1; - } - - errno = 0; - g = getgrgid (gid); - if (!g) - { - char buf [1024]; - sprintf (buf, "%s: error looking up name of group %d", blurb(), - (long) gid); - if (errno) - perror (buf); - else - fprintf (stderr, "%s: unknown error.\n", buf); - return -1; - } - - return set_ids_by_name (p, g, message_ret); -} - /* If we've been run as setuid or setgid to someone else (most likely root) turn off the extra permissions so that random user-specified programs @@ -298,7 +289,7 @@ hack_uid (saver_info *si) !strcmp (p->pw_name, "games")) { static char buf [1024]; - sprintf (buf, "running as %s", + sprintf (buf, "running as %.100s", (p && p->pw_name && *p->pw_name ? p->pw_name : "")); si->nolock_reason = buf;