diff options
author | Bill Nottingham <notting@redhat.com> | 2004-05-04 16:27:20 +0000 |
---|---|---|
committer | Bill Nottingham <notting@redhat.com> | 2004-05-04 16:27:20 +0000 |
commit | 8bc12cb8bd7088e5f067fb15687204a1837abdc1 (patch) | |
tree | c8bd7a3596fafaef754e01a70e79cf480585d31d /src/usernetctl.c | |
parent | 5e212fb145ee5483f7b3134217b9527b18cbd33e (diff) | |
download | initscripts-8bc12cb8bd7088e5f067fb15687204a1837abdc1.tar initscripts-8bc12cb8bd7088e5f067fb15687204a1837abdc1.tar.gz initscripts-8bc12cb8bd7088e5f067fb15687204a1837abdc1.tar.bz2 initscripts-8bc12cb8bd7088e5f067fb15687204a1837abdc1.tar.xz initscripts-8bc12cb8bd7088e5f067fb15687204a1837abdc1.zip |
cleanup fd leaks, mem leaks, other bogosities (#119987, <linux_4ever@yahoo.com>)
Diffstat (limited to 'src/usernetctl.c')
-rw-r--r-- | src/usernetctl.c | 28 |
1 files changed, 19 insertions, 9 deletions
diff --git a/src/usernetctl.c b/src/usernetctl.c index 2574d725..aa77c8a5 100644 --- a/src/usernetctl.c +++ b/src/usernetctl.c @@ -22,7 +22,7 @@ #include <limits.h> /* This will be running setuid root, so be careful! */ -static char * safeEnviron[] = { +static const char * safeEnviron[] = { "PATH=/bin:/sbin:/usr/bin:/usr/sbin", "HOME=/root", NULL @@ -39,11 +39,11 @@ usage(void) { } static size_t -testSafe(char *ifaceConfig) { +testSafe(char *ifaceConfig, int fd) { struct stat sb; /* These shouldn't be symbolic links -- anal, but that's fine w/ mkj. */ - if (lstat(ifaceConfig, &sb)) { + if (fstat(fd, &sb)) { fprintf(stderr, "failed to stat %s: %s\n", ifaceConfig, strerror(errno)); exit(1); @@ -78,15 +78,25 @@ userCtl(char *file) { int fd = -1, retval = NOT_FOUND; size_t size = 0; - size = testSafe(file); - - buf = contents = malloc(size + 2); - + /* Open the file and then test it to see if we like it. This way + we avoid switcheroo attacks. */ if ((fd = open(file, O_RDONLY)) == -1) { fprintf(stderr, "failed to open %s: %s\n", file, strerror(errno)); exit(1); } + size = testSafe(file, fd); + if (size > INT_MAX) { + fprintf(stderr, "file %s is too big\n", file); + exit(1); + } + + buf = contents = malloc(size + 2); + if (contents == NULL) { + fprintf(stderr, "failed to allocate memory\n"); + exit(1); + } + if (read(fd, contents, size) != size) { perror("error reading device configuration"); exit(1); @@ -105,7 +115,7 @@ userCtl(char *file) { while (chptr >= contents && isspace(*chptr)) chptr--; *(++chptr) = '\0'; - if (!strncmp(contents, "USERCTL=", 8)) { + if (!strncasecmp(contents, "USERCTL=", 8)) { contents += 8; if ((contents[0] == '"' && contents[strlen(contents) - 1] == '"') || @@ -116,7 +126,7 @@ userCtl(char *file) { contents[strlen(contents) - 1] = '\0'; } - if (!strcmp(contents, "yes") || !strcmp(contents, "true")) + if (!strcasecmp(contents, "yes") || !strcasecmp(contents, "true")) retval = FOUND_TRUE; else retval = FOUND_FALSE; |