Skip to content
  • Simon McVittie's avatar
    userdb: Reference-count DBusUserInfo, DBusGroupInfo · 2b7948ef
    Simon McVittie authored
    Previously, the hash table indexed by uid (or gid) took ownership of the
    single reference to the heap-allocated struct, and the hash table
    indexed by username (or group name) had a borrowed pointer to the same
    struct that exists in the other hash table.
    
    However, this can break down if you have two or more distinct usernames
    that share a numeric identifier. This is generally a bad idea, because
    the user-space model in such situations does not match the kernel-space
    reality, and in particular there is no effective kernel-level security
    boundary between such users, but it is sometimes done anyway.
    
    In this case, when the second username is looked up in the userdb, it
    overwrites (replaces) the entry in the hash table that is indexed by
    uid, freeing the DBusUserInfo. This results in both the key and the
    value in the hash table that is indexed by username becoming dangling
    pointers (use-after-free), leading to undefined behaviour, which is
    certainly not what we want to see when doing access control.
    
    An equivalent situation can occur with groups, in the rare case where
    a numeric group ID has two names (although I have not heard of this
    being done in practice).
    
    Solve this by reference-counting the data structure. There are up to
    three references in practice: one held temporarily while the lookup
    function is populating and storing it, one held by the hash table that
    is indexed by uid, and one held by the hash table that is indexed by
    name.
    
    Closes: #305
    
    
    Signed-off-by: default avatarSimon McVittie <smcv@collabora.com>
    2b7948ef