Zsh Mailing List Archive
Messages sorted by:
Reverse Date,
Date,
Thread,
Author
PATCH: compaudit allows owner of executable
- X-seq: zsh-workers 31013
- From: Peter Stephenson <p.w.stephenson@xxxxxxxxxxxx>
- To: Zsh Hackers' List <zsh-workers@xxxxxxx>
- Subject: PATCH: compaudit allows owner of executable
- Date: Wed, 30 Jan 2013 21:11:48 +0000
- List-help: <mailto:zsh-workers-help@zsh.org>
- List-id: Zsh Workers List <zsh-workers.zsh.org>
- List-post: <mailto:zsh-workers@zsh.org>
- Mailing-list: contact zsh-workers-help@xxxxxxx; run by ezmlm
This prevents compaudit failing on the case where the whole of zsh,
executable and function library, has been installed by a non-root user.
If you are running the executable, you necessarily trust whoever owns
it, so there's no point complaining if they also own the completion
files. We could print a warning message, but it seems way too late for
that.
I couldn't think of a reasonably safe, standard way of finding out who
owns the executable, however. So I've done it using the /proc file
system. I've also assumed zstat is available from zsh/stat.
Suggestions for improvements welcome.
Index: Completion/compaudit
===================================================================
RCS file: /cvsroot/zsh/zsh/Completion/compaudit,v
retrieving revision 1.11
diff -p -u -r1.11 compaudit
--- Completion/compaudit 10 Sep 2011 17:09:51 -0000 1.11
+++ Completion/compaudit 30 Jan 2013 21:10:33 -0000
@@ -82,18 +82,31 @@ fi
[[ $_i_fail == use ]] && return 0
+# We will always allow files to be owned by root and the owner of the
+# present process.
+local owners="u0u${EUID}"
+
+# If we can find out who owns the executable, we will allow files to
+# be owned by that user, too. The argument is that if you don't trust
+# the owner of the executable, it's way too late to worry about it now...
+if [[ -e /proc/$$/exe ]] && zmodload -F zsh/stat b:zstat 2>/dev/null; then
+ local -A stathash
+ if zstat -H stathash /proc/$$/exe && [[ $stathash[uid] -ne 0 ]]; then
+ owners+="u${stathash[uid]}"
+ fi
+fi
+
# We search for:
-# - world/group-writable directories in fpath not owned by root and the user
+# - world/group-writable directories in fpath not owned by $owners
# - parent-directories of directories in fpath that are world/group-writable
-# and not owned by root and the user (that would allow someone to put a
+# and not owned by $owners (that would allow someone to put a
# digest file for one of the directories into the parent directory)
-# - digest files for one of the directories in fpath not owned by root and
-# the user
-# - and for files in directories from fpath not owned by root and the user
+# - digest files for one of the directories in fpath not owned by $owners
+# - and for files in directories from fpath not owned by $owners
# (including zwc files)
-_i_wdirs=( ${^fpath}(N-f:g+w:,-f:o+w:,-^u0u${EUID})
- ${^fpath:h}(N-f:g+w:,-f:o+w:,-^u0u${EUID}) )
+_i_wdirs=( ${^fpath}(N-f:g+w:,-f:o+w:,-^${owners})
+ ${^fpath:h}(N-f:g+w:,-f:o+w:,-^${owners}) )
# RedHat Linux "per-user groups" check. This is tricky, because it's very
# difficult to tell whether the sysadmin has put someone else into your
@@ -111,7 +124,7 @@ if (( $#_i_wdirs )); then
if [[ $GROUP == $LOGNAME && ( -z $GROUPMEM || $GROUPMEM == $LOGNAME ) ]]
then
- _i_wdirs=( ${^_i_wdirs}(N-f:g+w:^g:${GROUP}:,-f:o+w:,-^u0u${EUID}) )
+ _i_wdirs=( ${^_i_wdirs}(N-f:g+w:^g:${GROUP}:,-f:o+w:,-^${owners}) )
fi
fi
@@ -122,8 +135,8 @@ then
_i_wdirs=( ${_i_wdirs:#/usr/local/*} ${^_i_ulwdirs}(Nf:g+ws:^g:staff:,f:o+w:,^u0) )
fi
-_i_wdirs=( $_i_wdirs ${^fpath}.zwc^([^_]*|*~)(N-^u0u${EUID}) )
-_i_wfiles=( ${^fpath}/^([^_]*|*~)(N-^u0u${EUID}) )
+_i_wdirs=( $_i_wdirs ${^fpath}.zwc^([^_]*|*~)(N-^${owners}) )
+_i_wfiles=( ${^fpath}/^([^_]*|*~)(N-^${owners}) )
case "${#_i_wdirs}:${#_i_wfiles}" in
(0:0) _i_q= ;;
--
Peter Stephenson <p.w.stephenson@xxxxxxxxxxxx>
Web page now at http://homepage.ntlworld.com/p.w.stephenson/
Messages sorted by:
Reverse Date,
Date,
Thread,
Author