On Mon, May 20, 2013 at 03:23:16PM -0400, Kurt Lidl wrote: > OK, maybe I'm missing something obvious, but...
> find(1) says: > -delete > Delete found files and/or directories. Always returns true. > This executes from the current working directory as find recurses > down the tree. It will not attempt to delete a filename with a > ``/'' character in its pathname relative to ``.'' for security > reasons. Depth-first traversal processing is implied by this > option. Following symlinks is incompatible with this option. > However, it fails even when the path is absolute: > bhyve9# mkdir /tmp/foo > bhyve9# find /tmp/foo -empty -delete > find: -delete: /tmp/foo: relative path potentially not safe > Shouldn't this work? The "relative path" refers to a pathname that contains a slash other than at the beginning or end and may therefore refer to somewhere else if a directory is concurrently replaced by a symlink. When -L is not specified and "." can be opened, the fts(3) code underlying find(1) is careful to avoid following symlinks or being dropped in different locations by moving the directory fts is currently traversing. If a problematic concurrent modification is detected, fts will not enter the directory or abort. Files found in the search are returned via the current working directory and a pathname not containing a slash. For paranoia, find(1) verifies this when -delete is used. However, it is too paranoid about the root of the traversal. It is already assumed that the initial pathname does not refer to directories or symlinks that might be replaced by untrusted users; otherwise, the whole traversal would be unsafe. Therefore, it is not necessary to do the check for fts_level == FTS_ROOTLEVEL. The below patch allows deleting the pathname given to find itself: Index: usr.bin/find/function.c =================================================================== --- usr.bin/find/function.c (revision 250661) +++ usr.bin/find/function.c (working copy) @@ -442,7 +442,8 @@ errx(1, "-delete: forbidden when symlinks are followed"); /* Potentially unsafe - do not accept relative paths whatsoever */ - if (strchr(entry->fts_accpath, '/') != NULL) + if (entry->fts_level > FTS_ROOTLEVEL && + strchr(entry->fts_accpath, '/') != NULL) errx(1, "-delete: %s: relative path potentially not safe", entry->fts_accpath); -- Jilles Tjoelker _______________________________________________ freebsd-hackers@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-hackers To unsubscribe, send any mail to "freebsd-hackers-unsubscr...@freebsd.org"