Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-15:Update
libgit2.25920
0004-config-validate-ownership-of-C__ProgramDat...
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File 0004-config-validate-ownership-of-C__ProgramData_Git_config-before-using-it.patch of Package libgit2.25920
From cb1439c9d32c059ee93216637a6d155306f76ab3 Mon Sep 17 00:00:00 2001 From: Johannes Schindelin <johannes.schindelin@gmx.de> Date: Wed, 19 Jun 2019 12:59:27 +0200 Subject: [PATCH] config: validate ownership of C:\ProgramData\Git\config before using it When the VirtualStore feature is in effect, it is safe to let random users write into C:\ProgramData because other users won't see those files. This seemed to be the case when we introduced support for C:\ProgramData\Git\config. However, when that feature is not in effect (which seems to be the case in newer Windows 10 versions), we'd rather not use those files unless they come from a trusted source, such as an administrator. This change imitates the strategy chosen by PowerShell's native OpenSSH port to Windows regarding host key files: if a system file is owned neither by an administrator, a system account, or the current user, it is ignored. --- src/config.c | 9 +++++- src/path.c | 77 ++++++++++++++++++++++++++++++++++++++++++++++++++++ src/path.h | 12 ++++++++ 3 files changed, 97 insertions(+), 1 deletion(-) diff --git a/src/config.c b/src/config.c index 86247671933..d0e439b551d 100644 --- a/src/config.c +++ b/src/config.c @@ -1111,8 +1111,15 @@ int git_config_find_system(git_buf *path) int git_config_find_programdata(git_buf *path) { + int ret; + git_buf_sanitize(path); - return git_sysdir_find_programdata_file(path, GIT_CONFIG_FILENAME_PROGRAMDATA); + ret = git_sysdir_find_programdata_file(path, + GIT_CONFIG_FILENAME_PROGRAMDATA); + if (ret != GIT_OK) + return ret; + + return git_path_validate_system_file_ownership(path->ptr); } int git_config__global_location(git_buf *buf) diff --git a/src/path.c b/src/path.c index 41232c2f644..150e09eb606 100644 --- a/src/path.c +++ b/src/path.c @@ -14,6 +14,7 @@ #include "win32/w32_buffer.h" #include "win32/w32_util.h" #include "win32/version.h" +#include <AclAPI.h> #else #include <dirent.h> #endif @@ -1946,3 +1947,79 @@ bool git_path_supports_symlinks(const char *dir) # git_buf_dispose(&path); # return supported; # } return git_path_is_ntfs_dotgit_attributes(name, len); } + +int git_path_validate_system_file_ownership(const char *path) +{ +#ifndef GIT_WIN32 + GIT_UNUSED(path); + return GIT_OK; +#else + git_win32_path buf; + PSID owner_sid; + PSECURITY_DESCRIPTOR descriptor = NULL; + HANDLE token; + TOKEN_USER *info = NULL; + DWORD err, len; + int ret; + + if (git_win32_path_from_utf8(buf, path) < 0) + return -1; + + err = GetNamedSecurityInfoW(buf, SE_FILE_OBJECT, + OWNER_SECURITY_INFORMATION | + DACL_SECURITY_INFORMATION, + &owner_sid, NULL, NULL, NULL, &descriptor); + + if (err == ERROR_FILE_NOT_FOUND || err == ERROR_PATH_NOT_FOUND) { + ret = GIT_ENOTFOUND; + goto cleanup; + } + + if (err != ERROR_SUCCESS) { + giterr_set(GITERR_OS, "failed to get security information"); + ret = GIT_ERROR; + goto cleanup; + } + + if (!IsValidSid(owner_sid)) { + giterr_set(GITERR_INVALID, "programdata configuration file owner is unknown"); + ret = GIT_ERROR; + goto cleanup; + } + + if (IsWellKnownSid(owner_sid, WinBuiltinAdministratorsSid) || + IsWellKnownSid(owner_sid, WinLocalSystemSid)) { + ret = GIT_OK; + goto cleanup; + } + + /* Obtain current user's SID */ + if (OpenProcessToken(GetCurrentProcess(), TOKEN_QUERY, &token) && + !GetTokenInformation(token, TokenUser, NULL, 0, &len)) { + info = git__malloc(len); + GIT_ERROR_CHECK_ALLOC(info); + if (!GetTokenInformation(token, TokenUser, info, len, &len)) { + git__free(info); + info = NULL; + } + } + + /* + * If the file is owned by the same account that is running the current + * process, it's okay to read from that file. + */ + if (info && EqualSid(owner_sid, info->User.Sid)) + ret = GIT_OK; + else { + giterr_set(GITERR_INVALID, "programdata configuration file owner is not valid"); + ret = GIT_ERROR; + } + free(info); + +cleanup: + if (descriptor) + LocalFree(descriptor); + + return ret; +#endif +} diff --git a/src/path.h b/src/path.h index 624ca03aac8..ed6b93574f0 100644 --- a/src/path.h +++ b/src/path.h @@ -649,4 +649,16 @@ int git_path_normalize_slashes(git_buf *out, const char *path); # # bool git_path_supports_symlinks(const char *dir); */ extern int git_path_is_hfs_dotgit_attributes(const char *name, size_t len); +/** + * Validate a system file's ownership + * + * Verify that the file in question is owned by an administrator or system + * account, or at least by the current user. + * + * This function returns 0 if successful. If the file is not owned by any of + * these, or any other if there have been problems determining the file + * ownership, it returns -1. + */ +int git_path_validate_system_file_ownership(const char *path); + #endif
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor