summaryrefslogtreecommitdiffstats
path: root/sftp-client.c
diff options
context:
space:
mode:
authordjm@openbsd.org <djm@openbsd.org>2021-08-07 02:10:49 +0200
committerDamien Miller <djm@mindrot.org>2021-08-07 02:20:31 +0200
commit133b44e500422df68c9c25c3b6de35c0263132f1 (patch)
tree94afc1d577f0f630495cb127732ae115cdf6a6cb /sftp-client.c
parentupstream: a bit more debugging of file attributes being (diff)
downloadopenssh-133b44e500422df68c9c25c3b6de35c0263132f1.tar.xz
openssh-133b44e500422df68c9c25c3b6de35c0263132f1.zip
upstream: fix incorrect directory permissions on scp -3
transfers; ok markus@ OpenBSD-Commit-ID: 64b2abaa5635a2be65ee2e77688ad9bcebf576c2
Diffstat (limited to '')
-rw-r--r--sftp-client.c42
1 files changed, 30 insertions, 12 deletions
diff --git a/sftp-client.c b/sftp-client.c
index 09b7897cf..d4ddc94fe 100644
--- a/sftp-client.c
+++ b/sftp-client.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: sftp-client.c,v 1.148 2021/08/07 00:09:57 djm Exp $ */
+/* $OpenBSD: sftp-client.c,v 1.149 2021/08/07 00:10:49 djm Exp $ */
/*
* Copyright (c) 2001-2004 Damien Miller <djm@openbsd.org>
*
@@ -307,6 +307,7 @@ get_handle(struct sftp_conn *conn, u_int expected_id, size_t *len,
return handle;
}
+/* XXX returing &static is error-prone. Refactor to fill *Attrib argument */
static Attrib *
get_decode_stat(struct sftp_conn *conn, u_int expected_id, int quiet)
{
@@ -2377,6 +2378,7 @@ crossload_dir_internal(struct sftp_conn *from, struct sftp_conn *to,
SFTP_DIRENT **dir_entries;
char *filename, *new_from_path = NULL, *new_to_path = NULL;
mode_t mode = 0777;
+ Attrib curdir;
if (depth >= MAX_DIR_DEPTH) {
error("Maximum directory depth exceeded: %d levels", depth);
@@ -2395,17 +2397,34 @@ crossload_dir_internal(struct sftp_conn *from, struct sftp_conn *to,
if (print_flag)
mprintf("Retrieving %s\n", from_path);
- dirattrib->flags &= ~SSH2_FILEXFER_ATTR_SIZE;
- dirattrib->flags &= ~SSH2_FILEXFER_ATTR_UIDGID;
- if (dirattrib->flags & SSH2_FILEXFER_ATTR_PERMISSIONS) {
- mode = dirattrib->perm & 01777;
- dirattrib->perm = mode | (S_IWUSR|S_IXUSR); /* temp */
- } else {
- debug("Server did not send permissions for "
+ curdir = *dirattrib; /* dirattrib will be clobbered */
+ curdir.flags &= ~SSH2_FILEXFER_ATTR_SIZE;
+ curdir.flags &= ~SSH2_FILEXFER_ATTR_UIDGID;
+ if ((curdir.flags & SSH2_FILEXFER_ATTR_PERMISSIONS) == 0) {
+ debug("Origin did not send permissions for "
"directory \"%s\"", to_path);
+ curdir.perm = S_IWUSR|S_IXUSR;
+ curdir.flags |= SSH2_FILEXFER_ATTR_PERMISSIONS;
}
- if (do_mkdir(to, to_path, dirattrib, print_flag) != 0)
- return -1;
+ /* We need to be able to write to the directory while we transfer it */
+ mode = curdir.perm & 01777;
+ curdir.perm = mode | (S_IWUSR|S_IXUSR);
+
+ /*
+ * sftp lacks a portable status value to match errno EEXIST,
+ * so if we get a failure back then we must check whether
+ * the path already existed and is a directory. Ensure we can
+ * write to the directory we create for the duration of the transfer.
+ */
+ if (do_mkdir(to, to_path, &curdir, 0) != 0) {
+ if ((dirattrib = do_stat(to, to_path, 0)) == NULL)
+ return -1;
+ if (!S_ISDIR(dirattrib->perm)) {
+ error("\"%s\" exists but is not a directory", to_path);
+ return -1;
+ }
+ }
+ curdir.perm = mode;
if (do_readdir(from, from_path, &dir_entries) == -1) {
error("%s: Failed to get directory contents", from_path);
@@ -2443,8 +2462,7 @@ crossload_dir_internal(struct sftp_conn *from, struct sftp_conn *to,
free(new_to_path);
free(new_from_path);
- dirattrib->perm = mode; /* original mode */
- do_setstat(to, to_path, dirattrib);
+ do_setstat(to, to_path, &curdir);
free_sftp_dirents(dir_entries);