From 8cb2f2fe999476b55358e3cfbdcbcbb3cf75f2cb Mon Sep 17 00:00:00 2001 From: dimitri staessens Date: Sun, 3 Jul 2016 16:20:56 +0200 Subject: tools, irm: move binary check to library This will make the library check if the user has permissions to execute the binary when auto is set. This prevents writing malicious software that would use the irmd to execute other applications to which the user has no access. --- src/tools/irm/irm_bind.c | 16 +++++++++------- 1 file changed, 9 insertions(+), 7 deletions(-) (limited to 'src/tools/irm/irm_bind.c') diff --git a/src/tools/irm/irm_bind.c b/src/tools/irm/irm_bind.c index 92ebdd8a..45da6e4c 100644 --- a/src/tools/irm/irm_bind.c +++ b/src/tools/irm/irm_bind.c @@ -22,7 +22,7 @@ #include #include -#include +#include #include @@ -45,7 +45,7 @@ int do_bind(int argc, char ** argv) char * name = NULL; char * ap_name = NULL; uint16_t flags = 0; - struct stat s; + int ret = 0; while (argc > 0) { if (matches(*argv, "name") == 0) { @@ -79,15 +79,17 @@ int do_bind(int argc, char ** argv) return -1; } - if (stat(ap_name, &s) != 0) { - printf("Application %s does not exist.\n", ap_name); + ret = irm_bind(name, ap_name, flags, argc, argv); + if (ret == -ENOENT) { + printf("%s does not exist.\n", ap_name); return -1; } - if (!(s.st_mode & S_IXUSR)) { - printf("Application %s is not executable.\n", ap_name); + if (ret == -EPERM) { + printf("Cannot execute %s, please check permissions.\n", + ap_name); return -1; } - return irm_bind(name, ap_name, flags, argc, argv); + return ret; } -- cgit v1.2.3