Skip to content

Commit 1c6de87

Browse files
committed
Merge branch 'cb/path-owner-check-with-sudo-plus' into seen
"sudo git foo" used to consider a repository owned by the original user a safe one to access; it now also considers a repository owned by root a safe one, too (after all, if an attacker can craft a malicious repository owned by root, the box is 0wned already). What's our take on this one? IIRC, the last time we discussed, Carlo was hestant to push this step forward? source: <[email protected]> * cb/path-owner-check-with-sudo-plus: git-compat-util: allow root to access both SUDO_UID and root owned
2 parents eb9db14 + 4ed4d90 commit 1c6de87

File tree

3 files changed

+14
-21
lines changed

3 files changed

+14
-21
lines changed

Documentation/config/safe.txt

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -31,11 +31,12 @@ As explained, Git only allows you to access repositories owned by
3131
yourself, i.e. the user who is running Git, by default. When Git
3232
is running as 'root' in a non Windows platform that provides sudo,
3333
however, git checks the SUDO_UID environment variable that sudo creates
34-
and will allow access to the uid recorded as its value instead.
34+
and will allow access to the uid recorded as its value in addition to
35+
the id from 'root'.
3536
This is to make it easy to perform a common sequence during installation
3637
"make && sudo make install". A git process running under 'sudo' runs as
3738
'root' but the 'sudo' command exports the environment variable to record
3839
which id the original user has.
3940
If that is not what you would prefer and want git to only trust
40-
repositories that are owned by root instead, then you must remove
41+
repositories that are owned by root instead, then you can remove
4142
the `SUDO_UID` variable from root's environment before invoking git.

git-compat-util.h

Lines changed: 10 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -470,9 +470,10 @@ static inline int git_offset_1st_component(const char *path)
470470
* maybe provide you with a patch that would prevent this issue again
471471
* in the future.
472472
*/
473-
static inline void extract_id_from_env(const char *env, uid_t *id)
473+
static inline int id_from_env_matches(const char *env, uid_t id)
474474
{
475475
const char *real_uid = getenv(env);
476+
int matches = 0;
476477

477478
/* discard anything empty to avoid a more complex check below */
478479
if (real_uid && *real_uid) {
@@ -482,9 +483,10 @@ static inline void extract_id_from_env(const char *env, uid_t *id)
482483
errno = 0;
483484
/* silent overflow errors could trigger a bug here */
484485
env_id = strtoul(real_uid, &endptr, 10);
485-
if (!*endptr && !errno)
486-
*id = env_id;
486+
if (!*endptr && !errno && (uid_t)env_id == id)
487+
matches = 1;
487488
}
489+
return matches;
488490
}
489491

490492
static inline int is_path_owned_by_current_uid(const char *path)
@@ -496,10 +498,13 @@ static inline int is_path_owned_by_current_uid(const char *path)
496498
return 0;
497499

498500
euid = geteuid();
501+
if (st.st_uid == euid)
502+
return 1;
503+
499504
if (euid == ROOT_UID)
500-
extract_id_from_env("SUDO_UID", &euid);
505+
return id_from_env_matches("SUDO_UID", st.st_uid);
501506

502-
return st.st_uid == euid;
507+
return 0;
503508
}
504509

505510
#define is_path_owned_by_current_user is_path_owned_by_current_uid

t/t0034-root-safe-directory.sh

Lines changed: 1 addition & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ test_expect_success 'can access if addressed explicitly' '
6868
)
6969
'
7070

71-
test_expect_failure SUDO 'can access with sudo if root' '
71+
test_expect_success SUDO 'can access with sudo if root' '
7272
(
7373
cd root/p &&
7474
sudo git status
@@ -85,19 +85,6 @@ test_expect_success SUDO 'can access with sudo if root by removing SUDO_UID' '
8585
)
8686
'
8787

88-
test_lazy_prereq SUDO_SUDO '
89-
sudo sudo id -u >u &&
90-
id -u root >r &&
91-
test_cmp u r
92-
'
93-
94-
test_expect_success SUDO_SUDO 'can access with sudo abusing SUDO_UID' '
95-
(
96-
cd root/p &&
97-
sudo sudo git status
98-
)
99-
'
100-
10188
# this MUST be always the last test
10289
test_expect_success SUDO 'cleanup' '
10390
sudo rm -rf root

0 commit comments

Comments
 (0)