Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(1156)

Unified Diff: sandbox/linux/suid/sandbox.cc

Issue 159025: Linux sandbox: save full list of SUID unsafe environment variables. (Closed)
Patch Set: ... Created 11 years, 5 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: sandbox/linux/suid/sandbox.cc
diff --git a/sandbox/linux/suid/sandbox.cc b/sandbox/linux/suid/sandbox.cc
index a81ba1ad6a0c4df8f0f05b37a6962fc280f42ccf..685afdbbdbb5f9161e5955b6cbf6bf28e96a14af 100644
--- a/sandbox/linux/suid/sandbox.cc
+++ b/sandbox/linux/suid/sandbox.cc
@@ -21,6 +21,8 @@
#include <sys/types.h>
#include <unistd.h>
+#include "sandbox/linux/suid/suid_unsafe_environment_variables.h"
+
#if !defined(CLONE_NEWPID)
#define CLONE_NEWPID 0x20000000
#endif
@@ -228,15 +230,25 @@ static bool DropRoot() {
}
static bool SetupChildEnvironment() {
- // ld.so will have cleared LD_LIBRARY_PATH because we are SUID. However, the
- // child process might need this so zygote_host_linux.cc saved a copy in
- // SANDBOX_LD_LIBRARY_PATH. This is safe because we have dropped root by this
+ // ld.so may have cleared several environment variable because we are SUID.
Evan Martin 2009/07/17 21:10:57 variable*s*
agl 2009/07/17 21:35:09 Done.
+ // However, the child process might need them so zygote_host_linux.cc saves a
+ // copy in SANDBOX_$x. This is safe because we have dropped root by this
// point, so we can only exec a binary with the permissions of the user who
// ran us in the first place.
- const char* sandbox_ld_library_path = getenv("SANDBOX_LD_LIBRARY_PATH");
- if (sandbox_ld_library_path) {
- setenv("LD_LIBRARY_PATH", sandbox_ld_library_path, 1 /* overwrite */);
- unsetenv("SANDBOX_LD_LIBRARY_PATH");
+
+ for (unsigned i = 0; kSUIDUnsafeEnvironmentVariables[i]; ++i) {
+ const char* const envvar = kSUIDUnsafeEnvironmentVariables[i];
+ char* const saved_envvar = SandboxSavedEnvironmentVariable(envvar);
+ if (!saved_envvar)
+ return false;
+
+ const char* const value = getenv(saved_envvar);
+ if (value) {
+ setenv(envvar, value, 1 /* overwrite */);
+ unsetenv(saved_envvar);
+ }
+
+ free(saved_envvar);
}
return true;

Powered by Google App Engine
This is Rietveld 408576698