Blame SOURCES/sudo-1.8.31-CVE-2021-3156.patch

9f5db7
diff -up ./plugins/sudoers/policy.c.heap-buffer ./plugins/sudoers/policy.c
9f5db7
--- ./plugins/sudoers/policy.c.heap-buffer	2019-10-28 13:28:52.000000000 +0100
9f5db7
+++ ./plugins/sudoers/policy.c	2021-01-20 11:38:06.481807015 +0100
9f5db7
@@ -100,10 +100,11 @@ parse_bool(const char *line, int varlen,
9f5db7
 int
9f5db7
 sudoers_policy_deserialize_info(void *v, char **runas_user, char **runas_group)
9f5db7
 {
9f5db7
+    const int edit_mask = MODE_EDIT|MODE_IGNORE_TICKET|MODE_NONINTERACTIVE;
9f5db7
     struct sudoers_policy_open_info *info = v;
9f5db7
-    char * const *cur;
9f5db7
     const char *p, *errstr, *groups = NULL;
9f5db7
     const char *remhost = NULL;
9f5db7
+    char * const *cur;
9f5db7
     int flags = 0;
9f5db7
     debug_decl(sudoers_policy_deserialize_info, SUDOERS_DEBUG_PLUGIN)
9f5db7
 
9f5db7
@@ -332,6 +333,12 @@ sudoers_policy_deserialize_info(void *v,
9f5db7
 #endif
9f5db7
     }
9f5db7
 
9f5db7
+    /* Sudo front-end should restrict mode flags for sudoedit. */
9f5db7
+    if (ISSET(flags, MODE_EDIT) && (flags & edit_mask) != flags) {
9f5db7
+	sudo_warnx(U_("invalid mode flags from sudo front end: 0x%x"), flags);
9f5db7
+	goto bad;
9f5db7
+    }
9f5db7
+
9f5db7
     user_gid = (gid_t)-1;
9f5db7
     user_sid = (pid_t)-1;
9f5db7
     user_uid = (gid_t)-1;
9f5db7
diff -up ./plugins/sudoers/sudoers.c.heap-buffer ./plugins/sudoers/sudoers.c
9f5db7
--- ./plugins/sudoers/sudoers.c.heap-buffer	2021-01-20 11:34:57.523317977 +0100
9f5db7
+++ ./plugins/sudoers/sudoers.c	2021-01-20 12:08:01.331553520 +0100
9f5db7
@@ -451,7 +451,7 @@ sudoers_policy_main(int argc, char * con
9f5db7
 
9f5db7
     /* If run as root with SUDO_USER set, set sudo_user.pw to that user. */
9f5db7
     /* XXX - causes confusion when root is not listed in sudoers */
9f5db7
-    if (sudo_mode & (MODE_RUN | MODE_EDIT) && prev_user != NULL) {
9f5db7
+    if (ISSET(sudo_mode, MODE_RUN|MODE_EDIT) && prev_user != NULL) {
9f5db7
 	if (user_uid == 0 && strcmp(prev_user, "root") != 0) {
9f5db7
 	    struct passwd *pw;
9f5db7
 
9f5db7
@@ -834,8 +834,8 @@ set_cmnd(void)
9f5db7
     if (user_cmnd == NULL)
9f5db7
 	user_cmnd = NewArgv[0];
9f5db7
 
9f5db7
-    if (sudo_mode & (MODE_RUN | MODE_EDIT | MODE_CHECK)) {
9f5db7
-	if (ISSET(sudo_mode, MODE_RUN | MODE_CHECK)) {
9f5db7
+    if (ISSET(sudo_mode, MODE_RUN|MODE_EDIT|MODE_CHECK)) {
9f5db7
+	if (!ISSET(sudo_mode, MODE_EDIT)) {
9f5db7
 	    if (def_secure_path && !user_is_exempt())
9f5db7
 		path = def_secure_path;
9f5db7
 	    if (!set_perms(PERM_RUNAS))
9f5db7
@@ -873,7 +873,8 @@ set_cmnd(void)
9f5db7
 		sudo_warnx(U_("%s: %s"), __func__, U_("unable to allocate memory"));
9f5db7
 		debug_return_int(-1);
9f5db7
 	    }
9f5db7
-	    if (ISSET(sudo_mode, MODE_SHELL|MODE_LOGIN_SHELL)) {
9f5db7
+	    if (ISSET(sudo_mode, MODE_SHELL|MODE_LOGIN_SHELL) &&
9f5db7
+            ISSET(sudo_mode, MODE_RUN)) {
9f5db7
 		/*
9f5db7
 		 * When running a command via a shell, the sudo front-end
9f5db7
 		 * escapes potential meta chars.  We unescape non-spaces
9f5db7
@@ -881,10 +882,22 @@ set_cmnd(void)
9f5db7
 		 */
9f5db7
 		for (to = user_args, av = NewArgv + 1; (from = *av); av++) {
9f5db7
 		    while (*from) {
9f5db7
-			if (from[0] == '\\' && !isspace((unsigned char)from[1]))
9f5db7
+			if (from[0] == '\\' && from[1] != '\0' &&
9f5db7
+				!isspace((unsigned char)from[1])) {
9f5db7
 			    from++;
9f5db7
+			}
9f5db7
+			if (size - (to - user_args) < 1) {
9f5db7
+			    sudo_warnx(U_("internal error, %s overflow"),
9f5db7
+				__func__);
9f5db7
+			    debug_return_int(NOT_FOUND_ERROR);
9f5db7
+			}
9f5db7
 			*to++ = *from++;
9f5db7
 		    }
9f5db7
+		    if (size - (to - user_args) < 1) {
9f5db7
+			sudo_warnx(U_("internal error, %s overflow"),
9f5db7
+			    __func__);
9f5db7
+			debug_return_int(NOT_FOUND_ERROR);
9f5db7
+		    }
9f5db7
 		    *to++ = ' ';
9f5db7
 		}
9f5db7
 		*--to = '\0';
9f5db7
diff -up ./plugins/sudoers/timestamp.c.heap-buffer ./plugins/sudoers/timestamp.c
9f5db7
--- ./plugins/sudoers/timestamp.c.heap-buffer	2021-01-20 12:11:28.218774128 +0100
9f5db7
+++ ./plugins/sudoers/timestamp.c	2021-01-20 12:20:41.772324808 +0100
9f5db7
@@ -652,8 +652,8 @@ timestamp_lock(void *vcookie, struct pas
9f5db7
     } else if (entry.type != TS_LOCKEXCL) {
9f5db7
 	/* Old sudo record, convert it to TS_LOCKEXCL. */
9f5db7
 	entry.type = TS_LOCKEXCL;
9f5db7
-	memset((char *)&entry + offsetof(struct timestamp_entry, type), 0,
9f5db7
-	    nread - offsetof(struct timestamp_entry, type));
9f5db7
+	memset((char *)&entry + offsetof(struct timestamp_entry, flags), 0,
9f5db7
+	    nread - offsetof(struct timestamp_entry, flags));
9f5db7
 	if (ts_write(cookie->fd, cookie->fname, &entry, 0) == -1)
9f5db7
 	    debug_return_bool(false);
9f5db7
     }
9f5db7
diff -up ./src/parse_args.c.heap-buffer ./src/parse_args.c
9f5db7
--- ./src/parse_args.c.heap-buffer	2021-01-20 11:35:18.231043445 +0100
9f5db7
+++ ./src/parse_args.c	2021-01-20 12:26:31.290591673 +0100
9f5db7
@@ -124,7 +124,10 @@ struct environment {
9f5db7
 /*
9f5db7
  * Default flags allowed when running a command.
9f5db7
  */
9f5db7
-#define DEFAULT_VALID_FLAGS	(MODE_BACKGROUND|MODE_PRESERVE_ENV|MODE_RESET_HOME|MODE_LOGIN_SHELL|MODE_NONINTERACTIVE|MODE_SHELL)
9f5db7
+#define DEFAULT_VALID_FLAGS	(MODE_BACKGROUND|MODE_PRESERVE_ENV|MODE_RESET_HOME|MODE_LOGIN_SHELL|MODE_NONINTERACTIVE|MODE_PRESERVE_GROUPS|MODE_SHELL)
9f5db7
+#define EDIT_VALID_FLAGS	MODE_NONINTERACTIVE
9f5db7
+#define LIST_VALID_FLAGS	(MODE_NONINTERACTIVE|MODE_LONG_LIST)
9f5db7
+#define VALIDATE_VALID_FLAGS	MODE_NONINTERACTIVE
9f5db7
 
9f5db7
 /* Option number for the --host long option due to ambiguity of the -h flag. */
9f5db7
 #define OPT_HOSTNAME	256
9f5db7
@@ -269,6 +272,7 @@ parse_args(int argc, char **argv, int *n
9f5db7
 	progname = "sudoedit";
9f5db7
 	mode = MODE_EDIT;
9f5db7
 	sudo_settings[ARG_SUDOEDIT].value = "true";
9f5db7
+	valid_flags = EDIT_VALID_FLAGS;
9f5db7
     }
9f5db7
 
9f5db7
     /* Load local IP addresses and masks. */
9f5db7
@@ -360,7 +364,7 @@ parse_args(int argc, char **argv, int *n
9f5db7
 			usage_excl(1);
9f5db7
 		    mode = MODE_EDIT;
9f5db7
 		    sudo_settings[ARG_SUDOEDIT].value = "true";
9f5db7
-		    valid_flags = MODE_NONINTERACTIVE;
9f5db7
+		    valid_flags = EDIT_VALID_FLAGS;
9f5db7
 		    break;
9f5db7
 		case 'g':
9f5db7
 		    assert(optarg != NULL);
9f5db7
@@ -371,6 +375,7 @@ parse_args(int argc, char **argv, int *n
9f5db7
 		    break;
9f5db7
 		case 'H':
9f5db7
 		    sudo_settings[ARG_SET_HOME].value = "true";
9f5db7
+		    SET(flags, MODE_RESET_HOME);
9f5db7
 		    break;
9f5db7
 		case 'h':
9f5db7
 		    if (optarg == NULL) {
9f5db7
@@ -421,7 +426,7 @@ parse_args(int argc, char **argv, int *n
9f5db7
 			    usage_excl(1);
9f5db7
 		    }
9f5db7
 		    mode = MODE_LIST;
9f5db7
-		    valid_flags = MODE_NONINTERACTIVE|MODE_LONG_LIST;
9f5db7
+		    valid_flags = LIST_VALID_FLAGS;
9f5db7
 		    break;
9f5db7
 		case 'n':
9f5db7
 		    SET(flags, MODE_NONINTERACTIVE);
9f5db7
@@ -429,6 +434,7 @@ parse_args(int argc, char **argv, int *n
9f5db7
 		    break;
9f5db7
 		case 'P':
9f5db7
 		    sudo_settings[ARG_PRESERVE_GROUPS].value = "true";
9f5db7
+		    SET(flags, MODE_PRESERVE_GROUPS);
9f5db7
 		    break;
9f5db7
 		case 'p':
9f5db7
 		    /* An empty prompt is allowed. */
9f5db7
@@ -478,7 +484,7 @@ parse_args(int argc, char **argv, int *n
9f5db7
 		    if (mode && mode != MODE_VALIDATE)
9f5db7
 			usage_excl(1);
9f5db7
 		    mode = MODE_VALIDATE;
9f5db7
-		    valid_flags = MODE_NONINTERACTIVE;
9f5db7
+		    valid_flags = VALIDATE_VALID_FLAGS;
9f5db7
 		    break;
9f5db7
 		case 'V':
9f5db7
 		    if (mode && mode != MODE_VERSION)
9f5db7
@@ -505,7 +511,7 @@ parse_args(int argc, char **argv, int *n
9f5db7
     if (!mode) {
9f5db7
 	/* Defer -k mode setting until we know whether it is a flag or not */
9f5db7
 	if (sudo_settings[ARG_IGNORE_TICKET].value != NULL) {
9f5db7
-	    if (argc == 0 && !(flags & (MODE_SHELL|MODE_LOGIN_SHELL))) {
9f5db7
+	    if (argc == 0 && !ISSET(flags, MODE_SHELL|MODE_LOGIN_SHELL)) {
9f5db7
 		mode = MODE_INVALIDATE;	/* -k by itself */
9f5db7
 		sudo_settings[ARG_IGNORE_TICKET].value = NULL;
9f5db7
 		valid_flags = 0;
9f5db7
@@ -568,23 +574,24 @@ parse_args(int argc, char **argv, int *n
9f5db7
     /*
9f5db7
      * For shell mode we need to rewrite argv
9f5db7
      */
9f5db7
-    if (ISSET(mode, MODE_RUN) && ISSET(flags, MODE_SHELL)) {
9f5db7
+    if (ISSET(flags, MODE_SHELL|MODE_LOGIN_SHELL) && ISSET(mode, MODE_RUN)) {
9f5db7
 	char **av, *cmnd = NULL;
9f5db7
 	int ac = 1;
9f5db7
 
9f5db7
 	if (argc != 0) {
9f5db7
 	    /* shell -c "command" */
9f5db7
 	    char *src, *dst;
9f5db7
-	    size_t cmnd_size = (size_t) (argv[argc - 1] - argv[0]) +
9f5db7
-		strlen(argv[argc - 1]) + 1;
9f5db7
+        size_t size = 0;
9f5db7
 
9f5db7
-	    cmnd = dst = reallocarray(NULL, cmnd_size, 2);
9f5db7
-	    if (cmnd == NULL)
9f5db7
+        for (av = argv; *av != NULL; av++)
9f5db7
+            size += strlen(*av) + 1;
9f5db7
+
9f5db7
+        if (size == 0 || (cmnd = reallocarray(NULL, size, 2)) == NULL)
9f5db7
 		sudo_fatalx(U_("%s: %s"), __func__, U_("unable to allocate memory"));
9f5db7
 	    if (!gc_add(GC_PTR, cmnd))
9f5db7
 		exit(1);
9f5db7
 
9f5db7
-	    for (av = argv; *av != NULL; av++) {
9f5db7
+        for (dst = cmnd, av = argv; *av != NULL; av++) {
9f5db7
 		for (src = *av; *src != '\0'; src++) {
9f5db7
 		    /* quote potential meta characters */
9f5db7
 		    if (!isalnum((unsigned char)*src) && *src != '_' && *src != '-' && *src != '$')