File descriptors
Pétur Ingi Egilsson
petur at petur.eu
Sun Apr 14 08:48:36 UTC 2013
The general understanding by users, be it right or wrong, is that whenever a files' permission is changed, then the effect is immediate everywhere in the system.
This wrong metal model _could_ result in malicious access to a file.
I merely wanted to bring the issue to your attention.
- pétur
On 14/04/2013, at 02:33, Dirk Engling <erdgeist at erdgeist.org> wrote:
> On 13.04.13 20:29, Pétur Ingi Egilsson wrote:
>
>> I noticed that if I execute the following code, then the program is
>> able to read the file even if the files' permissions are changed around
>> the /mark/ section in such a way that the UID under which the program is
>> running should not have any permission to read the file.
>>
>> This is not a desirable behaviour.
>> How can I prevent this behaviour on my system?
>
> Pétur,
>
> you may have a wrong understanding of what the difference between a file
> and its names is. The moment you open a file, the system call checks the
> permissions and if you are allowed to read the file, returns another
> name for your file, the fd.
I am aware of the difference.
>
> If you change permissions on the file name in the file system, your file
> descriptor is not affected. The overhead for chasing changes in your
> directory structure (and nothing else is changing permissions) on every
> read() system call would just not be bearable.
Understood.
>
> You can even delete the file from the file system and still reference
> the content by your descriptor. Only when the last name of your file is
> gone (i.e. you fclose your descriptor) the file is actually removed from
> the file system
>
>> fd = fopen(argv[2], "r");
>
> I am pretty sure, this should rather read argv[1]
Indeed.
>
> erdgeist
More information about the freebsd-security
mailing list