0
Files
src/sandbox
agl@chromium.org 16184b7ada Linux: updates to the SUID sandbox
(patch from Julien Tinnes)

* Light changes to make it compile as C99 code instead of C++ (no
  variable declaration inside 'for' loops initialization)

* argc = 0 would lead to memory corruption.

* Now always in CHROME_DEVEL_SANDBOX mode:
  + In the previous mode, the trusted binary was attacker-owned anyway
    because of the environment variables, so I believe it was trivial
    to bypass the check.

  + Remove check for being owned by current user.

* Move all the tmp dir creation stuff *before* CLONE_FS happens: avoid
  doing stuff in a scary environment. I closed the fd in the untrusted
  process.

* changed if (st.st_uid || st.st_gid || st.st_mode & S_IWOTH) to if
  (st.st_uid || st.st_gid || st.st_mode & 0777)

* Check rmdir/fchown/fchmod return values

* Check snprintf return value x3 (probably useless)


git-svn-id: svn://svn.chromium.org/chrome/trunk/src@24758 0039d316-1c4b-4281-b951-d872f2087c98
2009-08-28 18:46:21 +00:00
..
2009-08-28 18:46:21 +00:00
2009-08-28 18:46:21 +00:00