If we are unable to stat() sudoers as non-root, try again as root.
By default, sudo relies soley on group permissions to read sudoers to make it possible to store sudoers on NFS. However, if /etc/sudoers is not accessible to non-root uids for some reason, sudo will fail. Bug #880.
This commit is contained in:
@@ -879,11 +879,20 @@ open_sudoers(const char *sudoers, bool doedit, bool *keepopen)
|
|||||||
{
|
{
|
||||||
struct stat sb;
|
struct stat sb;
|
||||||
FILE *fp = NULL;
|
FILE *fp = NULL;
|
||||||
|
bool asroot = true;
|
||||||
debug_decl(open_sudoers, SUDOERS_DEBUG_PLUGIN)
|
debug_decl(open_sudoers, SUDOERS_DEBUG_PLUGIN)
|
||||||
|
|
||||||
if (!set_perms(PERM_SUDOERS))
|
if (!set_perms(PERM_SUDOERS))
|
||||||
debug_return_ptr(NULL);
|
debug_return_ptr(NULL);
|
||||||
|
|
||||||
|
/*
|
||||||
|
* If sudoers_uid == ROOT_UID and sudoers_mode is group readable
|
||||||
|
* set_perms() will use a non-zero uid in order to avoid NFS issues..
|
||||||
|
*/
|
||||||
|
if (sudoers_uid != ROOT_UID || ISSET(sudoers_mode, S_IRGRP))
|
||||||
|
asroot = false;
|
||||||
|
|
||||||
|
again:
|
||||||
switch (sudo_secure_file(sudoers, sudoers_uid, sudoers_gid, &sb)) {
|
switch (sudo_secure_file(sudoers, sudoers_uid, sudoers_gid, &sb)) {
|
||||||
case SUDO_PATH_SECURE:
|
case SUDO_PATH_SECURE:
|
||||||
/*
|
/*
|
||||||
@@ -917,6 +926,20 @@ open_sudoers(const char *sudoers, bool doedit, bool *keepopen)
|
|||||||
}
|
}
|
||||||
break;
|
break;
|
||||||
case SUDO_PATH_MISSING:
|
case SUDO_PATH_MISSING:
|
||||||
|
/*
|
||||||
|
* If we tried to stat() sudoers as non-root but got EACCES,
|
||||||
|
* try again as root.
|
||||||
|
*/
|
||||||
|
if (errno == EACCES && !asroot) {
|
||||||
|
int serrno = errno;
|
||||||
|
if (restore_perms()) {
|
||||||
|
if (!set_perms(PERM_ROOT))
|
||||||
|
debug_return_ptr(NULL);
|
||||||
|
asroot = true;
|
||||||
|
goto again;
|
||||||
|
}
|
||||||
|
errno = serrno;
|
||||||
|
}
|
||||||
log_warning(SLOG_SEND_MAIL, N_("unable to stat %s"), sudoers);
|
log_warning(SLOG_SEND_MAIL, N_("unable to stat %s"), sudoers);
|
||||||
break;
|
break;
|
||||||
case SUDO_PATH_BAD_TYPE:
|
case SUDO_PATH_BAD_TYPE:
|
||||||
|
Reference in New Issue
Block a user