syscallcompat: OpenNofollow: use O_DIRECTORY flag
...when opening intermedia directories to give us an extra layer of safety. From the FreeBSD man page: This flag can be used to prevent applications with elevated privileges from opening files which are even unsafe to open with O_RDONLY, such as device nodes.
This commit is contained in:
parent
926cb93b50
commit
03bf604fc0
@ -22,8 +22,8 @@ func OpenNofollow(baseDir string, relPath string, flags int, mode uint32) (fd in
|
||||
tlog.Warn.Printf("BUG: OpenNofollow called with absolute relPath=%q", relPath)
|
||||
return -1, syscall.EINVAL
|
||||
}
|
||||
// Open the base dir
|
||||
dirfd, err := syscall.Open(baseDir, syscall.O_RDONLY, 0)
|
||||
// Open the base dir (following symlinks)
|
||||
dirfd, err := syscall.Open(baseDir, syscall.O_RDONLY|syscall.O_DIRECTORY, 0)
|
||||
if err != nil {
|
||||
return -1, err
|
||||
}
|
||||
@ -39,7 +39,7 @@ func OpenNofollow(baseDir string, relPath string, flags int, mode uint32) (fd in
|
||||
// Walk intermediate directories
|
||||
var dirfd2 int
|
||||
for _, name := range dirs {
|
||||
dirfd2, err = Openat(dirfd, name, syscall.O_RDONLY|syscall.O_NOFOLLOW, 0)
|
||||
dirfd2, err = Openat(dirfd, name, syscall.O_RDONLY|syscall.O_NOFOLLOW|syscall.O_DIRECTORY, 0)
|
||||
syscall.Close(dirfd)
|
||||
if err != nil {
|
||||
return -1, err
|
||||
|
@ -31,8 +31,8 @@ func TestOpenNofollow(t *testing.T) {
|
||||
if err == nil {
|
||||
t.Fatalf("should have failed")
|
||||
}
|
||||
if err != syscall.ELOOP {
|
||||
t.Errorf("expected ELOOP, got %v", err)
|
||||
if err != syscall.ELOOP && err != syscall.ENOTDIR {
|
||||
t.Errorf("expected ELOOP or ENOTDIR, got %v", err)
|
||||
}
|
||||
// Check to see that the base dir can be opened as well
|
||||
fd, err = OpenNofollow(tmpDir, "", syscall.O_RDONLY, 0)
|
||||
|
Loading…
x
Reference in New Issue
Block a user