| ---[ Phrack Magazine Volume 8, Issue 52 January 26, 1998, article 06 of 20 |
|
|
|
|
| -------------------------[ Hardening the Linux Kernel (series 2.0.x) |
|
|
|
|
| --------[ route|daemon9 <route@infonexus.com> |
|
|
|
|
|
|
|
|
| ----[ Introduction and Impetus |
|
|
|
|
| Linux. The cutest Unix-like O/S alive today. Everyone knows at least |
| *one* person who has at least *one* Linux machine. Linux, whatever your |
| opinion of it, is out there, and is being used by more and more people. Many |
| of the people using Linux are using it in multi-user environments. All of a |
| sudden they find security to be a big issue. This article is for those people. |
|
|
| This article covers a few areas of potential insecurity in the Linux O/S |
| and attempts to improve upon them. It contains several security related |
| kernel patches for the 2.0.x kernels (each has been tested successfully on the |
| 2.0.3x kernels and most should work on older 2.0.x kernels; see each |
| subsection for more info). |
|
|
| These are kernel patches. They do nothing for user-land security. If you |
| can not set permissions and configure services correctly, you should not be |
| running a Unix machine. |
|
|
| These patches are not bugfixes. They are preventative security fixes. |
| They are intended to prevent possible problems and breaches of security from |
| occurring. In some cases they can remove (or at least severely complicate) the |
| threat of many of today's most popular methods of attack. |
|
|
| These patches are not really useful on a single-user machine. They are |
| really intended for a multi-user box. |
|
|
| This article is for those of you who want better security out of your Linux |
| O/S. If you want to go a bit further, look into the POSIX.1e (POSIX 6) stuff. |
| POSIX.1e is a security model that basically separates identity and privilege. |
| Effectively, it splits superuser privileges into different `capabilities`. |
| Additionally, the Linux POSIX.1e (linux-privs) implementation offers a bitmapped |
| securelevel, kernel-based auditing (userland audit hooks are being developed), |
| and ACLs. See: http://parc.power.net/morgan/Orange-Linux/linux-privs/index.html |
|
|
| To sum it up, in this article, we explore a few ways to make the multi-user |
| Linux machine a bit more secure and resilient to attack. |
|
|
|
|
| ----[ The Patches |
|
|
|
|
| procfs patch |
| ------------ |
| Tested on: 2.0.0 + |
| Author: route |
|
|
| Why should we allow anyone to be able to view info on any process? |
|
|
| Normally, /bin/ps can show process listing for every process in the |
| kernel's process table, regardless of ownership. A non-privileged user can |
| see all the running processes on a system. This can include information that |
| could be used in some forms of known / guessed PID-based attacks, not to |
| mention the obvious lack of privacy. /bin/ps gets this process information by |
| reading the /proc filesystem. |
|
|
| The /proc filesystem is a virtual filesystem interface into the O/S which |
| provides all kinds of good information including the status of various |
| portions of the running kernel and a list of currently running processes. It |
| has a filesystem interface, which means it has file-system-like access |
| controls. As such, we can change the default access permissions on the inode |
| from 555 to 500. |
|
|
| And that's the patch. We just change the permissions on the inode from |
| S_IFDIR | S_IRUGO | S_IXUGO to S_IFDIR | S_IRUSR | S_IXUSR. |
|
|
|
|
| trusted path execution patch |
| ---------------------------- |
| Tested on: 2.0.0 + |
| Author: route (2.0.x version, original 1.x patch by merc) |
|
|
| Why should we allow arbitrary programs execution rights? |
|
|
| Consider this scenario: You are the administrator of a multi-user Linux |
| machine. All of a sudden there is a new bug in the Pentium(tm) processor! |
| As it happens, this bug causes the CPU to lock up entirely, requiring a cold |
| reboot. This bug is also exploitable by any user regardless of privilege. All |
| it necessitates is for the malevolent user to 1) get the source, 2) compile the |
| exploit, and 3) execute the program. |
|
|
| Whelp... 1) has happened. You cannot prevent anyone from getting it. It's |
| out there. You could remove permissions from the compiler on your machine or |
| remove the binary entirely, but this does not stop the user from compiling |
| the exploit elsewhere, and getting the binary on your machine somehow. You |
| cannot prevent 2) either. However, if you only allow binaries to be executed |
| from a trusted path, you can prevent 3) from happening. A trusted path is |
| one that is inside is a root owned directory that is not group or world |
| writable. /bin, /usr/bin, /usr/local/bin, are (under normal circumstances) |
| considered trusted. Any non-root users home directory is not trusted, nor is |
| /tmp. Be warned: This patch is a major annoyance to users who like to execute |
| code and scripts from their home directories! It will make you extremely |
| un-popular as far as these people are concerned. It will also let you sleep |
| easier at night knowing that no unscrupulous persons will be executing |
| malicious bits of code on your machine. |
|
|
| Before any call to exec is allowed to run, we open the inode of the |
| directory that the executable lives in and check ownership and permissions. |
| If the directory is not owned by root, or is writable to group or other, we |
| consider that untrusted. |
|
|
|
|
| securelevel patch |
| ----------------- |
| Tested on: 2.0.26 + |
| Author: route |
|
|
| Damnit, if I set the immutable and append only bits, I did it for a reason. |
|
|
| This patch isn't really much of a patch. It simply bumps the securelevel |
| up, to 1 from 0. This freezes the immutable and append-only bits on files, |
| keeping anyone from changing them (from the normal chattr interface). Before |
| turning this on, you should of course make certain key files immutable, and |
| logfiles append-only. It is still possible to open the raw disk device, |
| however. Your average cut and paste hacker will probably not know how to do |
| this. |
| |
|
|
| stack execution disabling patch and symlink patch |
| ------------------------------- |
| Tested on: 2.0.30 + |
| Author: solar designer |
|
|
| From the documentation accompanying SD's patch: |
|
|
| This patch is intended to add protection against two classes of security |
| holes: buffer overflows and symlinks in /tmp. |
|
|
| Most buffer overflow exploits are based on overwriting a function's return |
| address on the stack to point to some arbitrary code, which is also put |
| onto the stack. If the stack area is non-executable, buffer overflow |
| vulnerabilities become harder to exploit. |
|
|
| Another way to exploit a buffer overflow is to point the return address to |
| a function in libc, usually system(). This patch also changes the default |
| address that shared libraries are mmap()ed at to make it always contain a |
| zero byte. This makes it impossible to specify any more data (parameters |
| to the function, or more copies of the return address when filling with a |
| pattern) in an exploit that has to do with ASCIIZ strings (this is the |
| case for most overflow vulnerabilities). |
|
|
| However, note that this patch is by no means a complete solution, it just |
| adds an extra layer of security. Some buffer overflow vulnerabilities will |
| still remain exploitable a more complicated way. The reason for using such |
| a patch is to protect against some of the buffer overflow vulnerabilities |
| that are yet unknown. |
|
|
| In this version of my patch I also added a symlink security fix, originally |
| by Andrew Tridgell. I changed it to prevent from using hard links too, by |
| simply not allowing non-root users to create hard links to files they don't |
| own, in +t directories. This seems to be the desired behavior anyway, since |
| otherwise users couldn't remove such links they just created. I also added |
| exploit attempt logging, this code is shared with the non-executable stack |
| stuff, and was the reason to make it a single patch instead of two separate |
| ones. You can enable them separately anyway. |
|
|
|
|
| GID split privilege patch |
| ------------------------------- |
| Tested on: 2.0.30 + |
| Author: Original version DaveG, updated for 2.0.33 by route |
|
|
| From the documentation accompanying Dave's original patch: |
| This is a simple kernel patch that allows you to perform certain |
| privileged operations with out requiring root access. With this patch |
| three groups become privileged groups allowed to do different operations |
| within the kernel. |
|
|
| GID 16 : a program running with group 16 privileges can bind to a |
| < 1024. This allows programs like: rlogin, rcp, rsh, and ssh |
| to run setgid 16 instead of setuid 0(root). This also allows |
| servers that need to run as root to bind to a privileged port |
| like named, to also run setgid 16. |
|
|
| GID 17 : any program running under GID 17 privileges will be able to |
| create a raw socket. Programs like ping and traceroute can now |
| be made to run setgid 17 instead of setuid 0(root). |
|
|
| GID 18 : This group is for SOCK_PACKET. This isn't useful for most people, |
| so if you don't know what it is, don't worry about it. |
|
|
| Limitations |
| ----------- |
| Since this is a simple patch, it is VERY limited. First of all, there |
| is no support for supplementary groups. This means that you can't stack |
| these privileges. If you need GID 16 and 17, there isn't much you can do |
| about it. |
|
|
|
|
|
|
| ----[ Installation |
|
|
|
|
| This patchfile has been tested and verified to work against the latest |
| stable release of the linux kernel (as of this writing, 2.0.33). It should |
| work against other 2.0.x releases as well with little or no modification. THIS |
| IS NOT A GUARANTEE! Please do not send me your failed patch logs from older |
| kernels. Take this as a perfect opportunity to upgrade your kernel to the |
| latest release. Note that several of these patches are for X86-Linux only. |
| Sorry. |
|
|
| 1. Create the symlink: |
|
|
| `cd /usr/src` |
| `ln -s linux-KERNEL_VERSION linux-stock` |
|
|
| 2. Apply the kernel patch: |
|
|
| `patch < slinux.patch >& patch.err` |
|
|
| 2a. Examine the error file for any failed hunks. Figure where you went wrong |
| in life: |
|
|
| `grep fail patch.err` |
|
|
| 3. Configure your kernel: |
|
|
| `make config` OR `make menu-config` OR `make xconfig` |
|
|
| 4. You will need to enable prompting for experimental code in your kernel and |
| turn on the patches individually. |
|
|
| 5. To configure the split GID privilege patch, add the follow to your |
| /etc/group file: |
|
|
| `cat >> /etc/group` |
| priv_port::16:user1, user2, user3 |
| raw_sock::17:user1, user2 |
| sock_pak::18:user2, user3 |
| ^D |
|
|
| Where `userx` are the usernames of the users you wish to give these |
| permissions to. Next, fix the corresponding group and permissions on the |
| binaries you wish to strip root privileges from: |
|
|
| `chgrp raw_sock /bin/ping` |
| `chmod 2755 /bin/ping` |
|
|
|
|
|
|
| ----[ The patchfile |
|
|
|
|
| This patchfile should be extracted with the Phrack Magazine Extraction |
| Utility included in this (and every) issue. |
|
|
| <++> slinux.patch |
| diff -ru linux-stock/Documentation/Configure.help linux-patched/Documentation/Configure.help |
| --- linux-stock/Documentation/Configure.help Fri Sep 5 20:43:58 1997 |
| +++ linux-patched/Documentation/Configure.help Mon Nov 10 22:02:36 1997 |
| @@ -720,6 +720,77 @@ |
| later load the module when you install the JDK or find an interesting |
| Java program that you can't live without. |
| |
| +Non-executable user stack area (EXPERIMENTAL) |
| +CONFIG_STACKEXEC |
| + Most buffer overflow exploits are based on overwriting a function's |
| + return address on the stack to point to some arbitrary code, which is |
| + also put onto the stack. If the stack area is non-executable, buffer |
| + overflow vulnerabilities become harder to exploit. However, a few |
| + programs depend on the stack being executable, and might stop working |
| + unless you also enable GCC trampolines autodetection below, or enable |
| + the stack area execution permission for every such program separately |
| + using chstk.c. If you don't know what all this is about, or don't care |
| + about security that much, say N. |
| + |
| +Autodetect GCC trampolines |
| +CONFIG_STACKEXEC_AUTOENABLE |
| + GCC generates trampolines on the stack to correctly pass control to |
| + nested functions when calling from outside. This requires the stack |
| + being executable. When this option is enabled, programs containing |
| + trampolines will automatically get their stack area executable when |
| + a trampoline is found. However, in some cases this autodetection can |
| + be fooled in a buffer overflow exploit, so it is more secure to |
| + disable this option and use chstk.c to enable the stack area execution |
| + permission for every such program separately. If you're too lazy, |
| + answer Y. |
| + |
| +Log buffer overflow exploit attempts |
| +CONFIG_STACKEXEC_LOG |
| + This option enables logging of buffer overflow exploit attempts. No |
| + more than one attempt per minute is logged, so this is safe. Say Y. |
| + |
| +Process table viewing restriction (EXPERIMENTAL) |
| +CONFIG_PROC_RESTRICT |
| + This option enables process table viewing restriction. Users will only |
| + be able to get status of processes they own, with the exception the |
| + root user, who can get an entire process table listing. This patch |
| + should not cause any problems with other programs but it is not fully |
| + tested under every possible contingency. You must enable the /proc |
| + filesystem for this option to be of any use. If you run a multi-user |
| + system and are reasonably concerned with privacy and/or security, say Y. |
| + |
| +Trusted path execution (EXPERIMENTAL) |
| +CONFIG_TPE |
| + This option enables trusted path execution. Binaries are considered |
| + `trusted` if they live in a root owned directory that is not group or |
| + world writable. If an attempt is made to execute a program from a non |
| + trusted directory, it will simply not be allowed to run. This is |
| + quite useful on a multi-user system where security is an issue. Users |
| + will not be able to compile and execute arbitrary programs (read: evil) |
| + from their home directories, as these directories are not trusted. |
| + This option is useless on a single user machine. |
| + |
| +Trusted path execution (EXPERIMENTAL) |
| +CONFIG_TPE_LOG |
| + This option enables logging of execution attempts from non-trusted |
| + paths. |
| + |
| +Secure mode (EXPERIMENTAL) |
| +CONFIG_SECURE_ON |
| + This bumps up the securelevel from 0 to 1. When the securelevel is `on`, |
| + immutable and append-only bits cannot be set or cleared. If you are not |
| + concerned with security, you can say `N`. |
| + |
| +Split Network Groups (EXPERIMENTAL) |
| +CONFIG_SPLIT_GID |
| + This is a simple kernel patch that allows you to perform certain |
| + privileged operations with out requiring root access. With this patch |
| + three groups become privileged groups allowed to do different operations |
| + within the kernel. |
| + GID 16 allows programs to bind to privledged ports. |
| + GID 17 allows programs to open raw sockets. |
| + GID 18 allows programs to open sock packets. |
| + |
| Processor type |
| CONFIG_M386 |
| This is the processor type of your CPU. It is used for optimizing |
| @@ -2951,6 +3020,27 @@ |
| netatalk, new mars-nwe and other file servers. At the time of |
| writing none of these are available. So it's safest to say N here |
| unless you really know that you need this feature. |
| + |
| +Symlink security fix (EXPERIMENTAL) |
| +CONFIG_SYMLINK_FIX |
| + A very common class of security hole on UNIX-like systems involves |
| + a malicious user creating a symbolic link in /tmp pointing at |
| + another user's file. When the victim then writes to that file they |
| + inadvertently write to the wrong file. Enabling this option fixes |
| + this class of hole by preventing a process from following a link |
| + which is in a +t directory unless they own the link. However, this |
| + fix does not affect links owned by root, since these could only be |
| + created by someone having root access already. To prevent someone |
| + from using a hard link instead, this fix does not allow non-root |
| + users to create hard links in a +t directory to files they don't |
| + own. Note that this fix might break things. Only say Y if security |
| + is more important. |
| + |
| +Log symlink exploit attempts |
| +CONFIG_SYMLINK_LOG |
| + This option enables logging of symlink (and hard link) exploit |
| + attempts. No more than one attempt per minute is logged, so this is |
| + safe. Say Y. |
| |
| Minix fs support |
| CONFIG_MINIX_FS |
| diff -ru linux-stock/arch/i386/config.in linux-patched/arch/i386/config.in |
| --- linux-stock/arch/i386/config.in Sun May 12 21:17:23 1996 |
| +++ linux-patched/arch/i386/config.in Sun Nov 9 12:38:27 1997 |
| @@ -35,6 +35,15 @@ |
| tristate 'Kernel support for ELF binaries' CONFIG_BINFMT_ELF |
| if [ "$CONFIG_EXPERIMENTAL" = "y" ]; then |
| tristate 'Kernel support for JAVA binaries' CONFIG_BINFMT_JAVA |
| + bool 'Non-executable user stack area (EXPERIMENTAL)' CONFIG_STACKEXEC |
| + if [ "$CONFIG_STACKEXEC" = "y" ]; then |
| + bool ' Autodetect GCC trampolines' CONFIG_STACKEXEC_AUTOENABLE |
| + bool ' Log buffer overflow exploit attempts' CONFIG_STACKEXEC_LOG |
| + fi |
| + bool ' Restrict process table viewing (EXPERIMENTAL)' CONFIG_PROC_RESTRICT |
| + bool ' Trusted path execution (EXPERIMENTAL)' CONFIG_TPE |
| + bool ' Log untrusted path execution attempts (EXPERIMENTAL)' CONFIG_TPE_LOG |
| + bool ' Split Network GIDs (EXPERIMENTAL)' CONFIG_SPLIT_GID |
| fi |
| bool 'Compile kernel as ELF - if your GCC is ELF-GCC' CONFIG_KERNEL_ELF |
| |
| diff -ru linux-stock/arch/i386/defconfig linux-patched/arch/i386/defconfig |
| --- linux-stock/arch/i386/defconfig Mon Sep 22 13:44:01 1997 |
| +++ linux-patched/arch/i386/defconfig Sun Nov 9 12:38:23 1997 |
| @@ -24,6 +24,10 @@ |
| CONFIG_SYSVIPC=y |
| CONFIG_BINFMT_AOUT=y |
| CONFIG_BINFMT_ELF=y |
| +# CONFIG_STACKEXEC is not set |
| +CONFIG_STACKEXEC_AUTOENABLE=y |
| +CONFIG_STACKEXEC_LOG=y |
| +CONFIG_SPLIT_GID=y |
| CONFIG_KERNEL_ELF=y |
| # CONFIG_M386 is not set |
| # CONFIG_M486 is not set |
| @@ -134,6 +138,8 @@ |
| # Filesystems |
| # |
| # CONFIG_QUOTA is not set |
| +# CONFIG_SYMLINK_FIX is not set |
| +CONFIG_SYMLINK_LOG=y |
| CONFIG_MINIX_FS=y |
| # CONFIG_EXT_FS is not set |
| CONFIG_EXT2_FS=y |
| @@ -143,6 +149,9 @@ |
| # CONFIG_VFAT_FS is not set |
| # CONFIG_UMSDOS_FS is not set |
| CONFIG_PROC_FS=y |
| +CONFIG_PROC_RESTRICT=y |
| +CONFIG_TPE=y |
| +CONFIG_TPE_LOG=y |
| CONFIG_NFS_FS=y |
| # CONFIG_ROOT_NFS is not set |
| # CONFIG_SMB_FS is not set |
| diff -ru linux-stock/arch/i386/kernel/head.S linux-patched/arch/i386/kernel/head.S |
| --- linux-stock/arch/i386/kernel/head.S Tue Aug 5 09:19:53 1997 |
| +++ linux-patched/arch/i386/kernel/head.S Sun Nov 9 00:55:50 1997 |
| @@ -400,10 +400,17 @@ |
| .quad 0x0000000000000000 /* not used */ |
| .quad 0xc0c39a000000ffff /* 0x10 kernel 1GB code at 0xC0000000 */ |
| .quad 0xc0c392000000ffff /* 0x18 kernel 1GB data at 0xC0000000 */ |
| +#ifdef CONFIG_STACKEXEC |
| + .quad 0x00cafa000000ffff /* 0x23 user 2.75GB code at 0 */ |
| + .quad 0x00cbf2000000ffff /* 0x2b user 3GB data at 0 */ |
| + .quad 0x00cbda000000ffff /* 0x32 user 3GB code at 0, DPL=2 */ |
| + .quad 0x00cbd2000000ffff /* 0x3a user 3GB stack at 0, DPL=2 */ |
| +#else |
| .quad 0x00cbfa000000ffff /* 0x23 user 3GB code at 0x00000000 */ |
| .quad 0x00cbf2000000ffff /* 0x2b user 3GB data at 0x00000000 */ |
| .quad 0x0000000000000000 /* not used */ |
| .quad 0x0000000000000000 /* not used */ |
| +#endif |
| .fill 2*NR_TASKS,8,0 /* space for LDT's and TSS's etc */ |
| #ifdef CONFIG_APM |
| .quad 0x00c09a0000000000 /* APM CS code */ |
| diff -ru linux-stock/arch/i386/kernel/ptrace.c linux-patched/arch/i386/kernel/ptrace.c |
| --- linux-stock/arch/i386/kernel/ptrace.c Mon Aug 4 12:12:22 1997 |
| +++ linux-patched/arch/i386/kernel/ptrace.c Sun Nov 9 00:55:50 1997 |
| @@ -413,7 +413,7 @@ |
| addr == FS || addr == GS || |
| addr == CS || addr == SS) { |
| data &= 0xffff; |
| - if (data && (data & 3) != 3) |
| + if (data && (data & 3) < 2) |
| return -EIO; |
| } |
| if (addr == EFL) { /* flags. */ |
| @@ -423,6 +423,10 @@ |
| /* Do not allow the user to set the debug register for kernel |
| address space */ |
| if(addr < 17){ |
| + if (addr == EIP && (data & 0xF0000000) == 0xB0000000) |
| + if (put_stack_long(child, CS*sizeof(long)-MAGICNUMBER, USER_HUGE_CS) || |
| + put_stack_long(child, SS*sizeof(long)-MAGICNUMBER, USER_HUGE_SS)) |
| + return -EIO; |
| if (put_stack_long(child, sizeof(long)*addr-MAGICNUMBER, data)) |
| return -EIO; |
| return 0; |
| diff -ru linux-stock/arch/i386/kernel/signal.c linux-patched/arch/i386/kernel/signal.c |
| --- linux-stock/arch/i386/kernel/signal.c Mon Aug 4 12:12:51 1997 |
| +++ linux-patched/arch/i386/kernel/signal.c Sun Nov 9 00:55:50 1997 |
| @@ -83,10 +83,10 @@ |
| #define COPY_SEG(x) \ |
| if ( (context.x & 0xfffc) /* not a NULL selectors */ \ |
| && (context.x & 0x4) != 0x4 /* not a LDT selector */ \ |
| - && (context.x & 3) != 3 /* not a RPL3 GDT selector */ \ |
| + && (context.x & 3) < 2 /* not a RPL3 or RPL2 GDT selector */ \ |
| ) goto badframe; COPY(x); |
| #define COPY_SEG_STRICT(x) \ |
| -if (!(context.x & 0xfffc) || (context.x & 3) != 3) goto badframe; COPY(x); |
| +if (!(context.x & 0xfffc) || (context.x & 3) < 2) goto badframe; COPY(x); |
| struct sigcontext_struct context; |
| struct pt_regs * regs; |
| |
| @@ -167,16 +167,20 @@ |
| unsigned long * frame; |
| |
| frame = (unsigned long *) regs->esp; |
| - if (regs->ss != USER_DS && sa->sa_restorer) |
| + if (regs->ss != USER_DS && regs->ss != USER_HUGE_SS && sa->sa_restorer) |
| frame = (unsigned long *) sa->sa_restorer; |
| frame -= 64; |
| if (verify_area(VERIFY_WRITE,frame,64*4)) |
| do_exit(SIGSEGV); |
| |
| /* set up the "normal" stack seen by the signal handler (iBCS2) */ |
| +#ifdef CONFIG_STACKEXEC |
| + put_user((unsigned long)MAGIC_SIGRETURN, frame); |
| +#else |
| #define __CODE ((unsigned long)(frame+24)) |
| #define CODE(x) ((unsigned long *) ((x)+__CODE)) |
| put_user(__CODE,frame); |
| +#endif |
| if (current->exec_domain && current->exec_domain->signal_invmap) |
| put_user(current->exec_domain->signal_invmap[signr], frame+1); |
| else |
| @@ -204,19 +208,17 @@ |
| /* non-iBCS2 extensions.. */ |
| put_user(oldmask, frame+22); |
| put_user(current->tss.cr2, frame+23); |
| +#ifndef CONFIG_STACKEXEC |
| /* set up the return code... */ |
| put_user(0x0000b858, CODE(0)); /* popl %eax ; movl $,%eax */ |
| put_user(0x80cd0000, CODE(4)); /* int $0x80 */ |
| put_user(__NR_sigreturn, CODE(2)); |
| #undef __CODE |
| #undef CODE |
| +#endif |
| |
| /* Set up registers for signal handler */ |
| - regs->esp = (unsigned long) frame; |
| - regs->eip = (unsigned long) sa->sa_handler; |
| - regs->cs = USER_CS; regs->ss = USER_DS; |
| - regs->ds = USER_DS; regs->es = USER_DS; |
| - regs->gs = USER_DS; regs->fs = USER_DS; |
| + start_thread(regs, (unsigned long)sa->sa_handler, (unsigned long)frame); |
| regs->eflags &= ~TF_MASK; |
| } |
| |
| diff -ru linux-stock/arch/i386/kernel/traps.c linux-patched/arch/i386/kernel/traps.c |
| --- linux-stock/arch/i386/kernel/traps.c Mon Aug 11 13:37:24 1997 |
| +++ linux-patched/arch/i386/kernel/traps.c Sun Nov 9 00:55:50 1997 |
| @@ -117,7 +117,7 @@ |
| |
| esp = (unsigned long) ®s->esp; |
| ss = KERNEL_DS; |
| - if ((regs->eflags & VM_MASK) || (3 & regs->cs) == 3) |
| + if ((regs->eflags & VM_MASK) || (3 & regs->cs) >= 2) |
| return; |
| if (regs->cs & 3) { |
| esp = regs->esp; |
| @@ -193,11 +193,82 @@ |
| |
| asmlinkage void do_general_protection(struct pt_regs * regs, long error_code) |
| { |
| +#ifdef CONFIG_STACKEXEC |
| + unsigned long retaddr; |
| +#endif |
| + |
| if (regs->eflags & VM_MASK) { |
| handle_vm86_fault((struct vm86_regs *) regs, error_code); |
| return; |
| } |
| + |
| +#ifdef CONFIG_STACKEXEC |
| +/* Check if it was return from a signal handler */ |
| + if (regs->cs == USER_CS || regs->cs == USER_HUGE_CS) |
| + if (get_seg_byte(USER_DS, (char *)regs->eip) == 0xC3) |
| + if (!verify_area(VERIFY_READ, (void *)regs->esp, 4)) |
| + if ((retaddr = get_seg_long(USER_DS, (char *)regs->esp)) == |
| + MAGIC_SIGRETURN) { |
| +/* |
| + * Call sys_sigreturn() to restore the context. It would definitely be better |
| + * to convert sys_sigreturn() into an inline function accepting a pointer to |
| + * pt_regs, making this faster... |
| + */ |
| + regs->esp += 8; |
| + __asm__("movl %3,%%esi;" |
| + "subl %1,%%esp;" |
| + "movl %2,%%ecx;" |
| + "movl %%esp,%%edi;" |
| + "cld; rep; movsl;" |
| + "call sys_sigreturn;" |
| + "leal %3,%%edi;" |
| + "addl %1,%%edi;" |
| + "movl %%esp,%%esi;" |
| + "movl (%%edi),%%edi;" |
| + "movl %2,%%ecx;" |
| + "cld; rep; movsl;" |
| + "movl %%esi,%%esp" |
| + : |
| +/* %eax is returned separately */ |
| + "=a" (regs->eax) |
| + : |
| + "i" (sizeof(*regs)), |
| + "i" (sizeof(*regs) >> 2), |
| + "m" (regs) |
| + : |
| + "cx", "dx", "si", "di", "cc", "memory"); |
| + return; |
| + } |
| + |
| +#ifdef CONFIG_STACKEXEC_LOG |
| +/* |
| + * Check if we're returning to the stack area, which is only likely to happen |
| + * when attempting to exploit a buffer overflow. |
| + */ |
| + else if (regs->cs == USER_CS && |
| + (retaddr & 0xF0000000) == 0xB0000000) |
| + security_alert("buffer overflow"); |
| +#endif |
| +#endif |
| + |
| die_if_kernel("general protection",regs,error_code); |
| + |
| +#if defined(CONFIG_STACKEXEC) && defined(CONFIG_STACKEXEC_AUTOENABLE) |
| +/* |
| + * Switch to the original huge code segment (and allow code execution on the |
| + * stack for this entire process), if the faulty instruction is a call %reg, |
| + * except for call %esp. |
| + */ |
| + if (regs->cs == USER_CS) |
| + if (get_seg_byte(USER_DS, (char *)regs->eip) == 0xFF && |
| + (get_seg_byte(USER_DS, (char *)(regs->eip + 1)) & 0xD8) == 0xD0 && |
| + get_seg_byte(USER_DS, (char *)(regs->eip + 1)) != 0xD4) { |
| + current->flags |= PF_STACKEXEC; |
| + regs->cs = USER_HUGE_CS; regs->ss = USER_HUGE_SS; |
| + return; |
| + } |
| +#endif |
| + |
| current->tss.error_code = error_code; |
| current->tss.trap_no = 13; |
| force_sig(SIGSEGV, current); |
| diff -ru linux-stock/arch/i386/mm/fault.c linux-patched/arch/i386/mm/fault.c |
| --- linux-stock/arch/i386/mm/fault.c Sat Aug 16 22:21:20 1997 |
| +++ linux-patched/arch/i386/mm/fault.c Sun Nov 9 00:55:50 1997 |
| @@ -44,6 +44,7 @@ |
| unsigned long page; |
| int write; |
| |
| + if ((regs->cs & 3) >= 2) error_code |= 4; |
| /* get the address */ |
| __asm__("movl %%cr2,%0":"=r" (address)); |
| down(&mm->mmap_sem); |
| diff -ru linux-stock/fs/binfmt_aout.c linux-patched/fs/binfmt_aout.c |
| --- linux-stock/fs/binfmt_aout.c Wed Oct 15 14:56:43 1997 |
| +++ linux-patched/fs/binfmt_aout.c Tue Nov 11 00:38:48 1997 |
| @@ -315,6 +315,7 @@ |
| current->suid = current->euid = current->fsuid = bprm->e_uid; |
| current->sgid = current->egid = current->fsgid = bprm->e_gid; |
| current->flags &= ~PF_FORKNOEXEC; |
| + if (N_FLAGS(ex) & F_STACKEXEC) current->flags |= PF_STACKEXEC; |
| if (N_MAGIC(ex) == OMAGIC) { |
| #ifdef __alpha__ |
| do_mmap(NULL, N_TXTADDR(ex) & PAGE_MASK, |
| diff -ru linux-stock/fs/binfmt_elf.c linux-patched/fs/binfmt_elf.c |
| --- linux-stock/fs/binfmt_elf.c Wed Oct 15 14:56:43 1997 |
| +++ linux-patched/fs/binfmt_elf.c Tue Nov 11 01:02:05 1997 |
| @@ -55,7 +55,10 @@ |
| #define ELF_PAGESTART(_v) ((_v) & ~(unsigned long)(ELF_EXEC_PAGESIZE-1)) |
| #define ELF_PAGEOFFSET(_v) ((_v) & (ELF_EXEC_PAGESIZE-1)) |
| |
| -static struct linux_binfmt elf_format = { |
| +#ifndef CONFIG_STACKEXEC |
| +static |
| +#endif |
| +struct linux_binfmt elf_format = { |
| #ifndef MODULE |
| NULL, NULL, load_elf_binary, load_elf_library, elf_core_dump |
| #else |
| @@ -662,6 +665,7 @@ |
| current->suid = current->euid = current->fsuid = bprm->e_uid; |
| current->sgid = current->egid = current->fsgid = bprm->e_gid; |
| current->flags &= ~PF_FORKNOEXEC; |
| + if (elf_ex.e_flags & EF_STACKEXEC) current->flags |= PF_STACKEXEC; |
| bprm->p = (unsigned long) |
| create_elf_tables((char *)bprm->p, |
| bprm->argc, |
| diff -ru linux-stock/fs/exec.c linux-patched/fs/exec.c |
| --- linux-stock/fs/exec.c Wed Oct 15 14:56:43 1997 |
| +++ linux-patched/fs/exec.c Tue Nov 11 12:59:51 1997 |
| @@ -475,6 +475,8 @@ |
| } |
| current->comm[i] = '\0'; |
| |
| + current->flags &= ~PF_STACKEXEC; |
| + |
| /* Release all of the old mmap stuff. */ |
| if (exec_mmap()) |
| return -ENOMEM; |
| @@ -650,12 +652,30 @@ |
| int do_execve(char * filename, char ** argv, char ** envp, struct pt_regs * regs) |
| { |
| struct linux_binprm bprm; |
| + struct inode *dir; |
| + const char *basename; |
| + int namelen; |
| int retval; |
| int i; |
| |
| bprm.p = PAGE_SIZE*MAX_ARG_PAGES-sizeof(void *); |
| for (i=0 ; i<MAX_ARG_PAGES ; i++) /* clear page-table */ |
| bprm.page[i] = 0; |
| + |
| +#ifdef CONFIG_TPE |
| + /* Check to make sure the path is trusted. If the directory is root |
| + * owned and not group/world writable, it's trusted. Otherwise, |
| + * return -EACCES and optionally log it |
| + */ |
| + dir_namei(filename, &namelen, &basename, NULL, &dir); |
| + if (dir->i_mode & (S_IWGRP | S_IWOTH) || dir->i_uid) |
| + { |
| +#ifdef CONFIG_TPE_LOG |
| + security_alert("Trusted path execution violation"); |
| +#endif /* CONFIG_TPE_LOG */ |
| + return -EACCES; |
| + } |
| +#endif /* CONFIG_TPE */ |
| retval = open_namei(filename, 0, 0, &bprm.inode, NULL); |
| if (retval) |
| return retval; |
| diff -ru linux-stock/fs/namei.c linux-patched/fs/namei.c |
| --- linux-stock/fs/namei.c Sat Aug 16 16:23:19 1997 |
| +++ linux-patched/fs/namei.c Tue Nov 11 00:44:51 1997 |
| @@ -19,6 +19,7 @@ |
| #include <linux/fcntl.h> |
| #include <linux/stat.h> |
| #include <linux/mm.h> |
| +#include <linux/config.h> |
| |
| #define ACC_MODE(x) ("\000\004\002\006"[(x)&O_ACCMODE]) |
| |
| @@ -207,6 +208,23 @@ |
| *res_inode = inode; |
| return 0; |
| } |
| +#ifdef CONFIG_SYMLINK_FIX |
| +/* |
| + * Don't follow links that we don't own in +t directories, unless the link |
| + * is owned by root. |
| + */ |
| + if (S_ISLNK(inode->i_mode) && (dir->i_mode & S_ISVTX) && |
| + inode->i_uid && |
| + current->fsuid != inode->i_uid) { |
| +#ifdef CONFIG_SYMLINK_LOG |
| + security_alert("symlink"); |
| +#endif |
| + iput(dir); |
| + iput(inode); |
| + *res_inode = NULL; |
| + return -EPERM; |
| + } |
| +#endif |
| return inode->i_op->follow_link(dir,inode,flag,mode,res_inode); |
| } |
| |
| @@ -216,8 +234,13 @@ |
| * dir_namei() returns the inode of the directory of the |
| * specified name, and the name within that directory. |
| */ |
| +#ifdef CONFIG_TPE |
| +int dir_namei(const char *pathname, int *namelen, const char **name, |
| + struct inode * base, struct inode **res_inode) |
| +#else |
| static int dir_namei(const char *pathname, int *namelen, const char **name, |
| struct inode * base, struct inode **res_inode) |
| +#endif /* CONFIG_TPE */ |
| { |
| char c; |
| const char * thisname; |
| @@ -787,6 +810,22 @@ |
| iput(dir); |
| return -EPERM; |
| } |
| +#ifdef CONFIG_SYMLINK_FIX |
| +/* |
| + * Don't allow non-root users to create hard links to files they don't own |
| + * in a +t directory. |
| + */ |
| + if ((dir->i_mode & S_ISVTX) && |
| + current->fsuid != oldinode->i_uid && |
| + !fsuser()) { |
| +#ifdef CONFIG_SYMLINK_LOG |
| + security_alert("hard link"); |
| +#endif |
| + iput(oldinode); |
| + iput(dir); |
| + return -EPERM; |
| + } |
| +#endif |
| if (IS_RDONLY(dir)) { |
| iput(oldinode); |
| iput(dir); |
| diff -ru linux-stock/fs/proc/base.c linux-patched/fs/proc/base.c |
| --- linux-stock/fs/proc/base.c Wed Feb 21 01:26:09 1996 |
| +++ linux-patched/fs/proc/base.c Sun Nov 9 10:53:19 1997 |
| @@ -74,7 +74,11 @@ |
| */ |
| struct proc_dir_entry proc_pid = { |
| PROC_PID_INO, 5, "<pid>", |
| - S_IFDIR | S_IRUGO | S_IXUGO, 2, 0, 0, |
| +#ifdef CONFIG_PROC_RESTRICT |
| + S_IFDIR | S_IRUSR | S_IXUSR, 2, 0, 0, |
| +#else |
| + S_IFDIR | S_IRUGO | S_IXUGO, 2, 0, 0, |
| +#endif /* CONFIG_PROC_RESTRICT */ |
| 0, &proc_base_inode_operations, |
| NULL, proc_pid_fill_inode, |
| NULL, &proc_root, NULL |
| diff -ru linux-stock/fs/proc/inode.c linux-patched/fs/proc/inode.c |
| --- linux-stock/fs/proc/inode.c Sat Nov 30 02:21:21 1996 |
| +++ linux-patched/fs/proc/inode.c Sun Nov 9 10:58:06 1997 |
| @@ -153,7 +153,11 @@ |
| if (!p || i >= NR_TASKS) |
| return; |
| if (ino == PROC_ROOT_INO) { |
| - inode->i_mode = S_IFDIR | S_IRUGO | S_IXUGO; |
| +#ifdef CONFIG_PROC_RESTRICT |
| + inode->i_mode = S_IFDIR | S_IRUSR | S_IXUSR; |
| +#else |
| + inode->i_mode = S_IFDIR | S_IRUGO | S_IXUGO; |
| +#endif /* CONFIG_PROC_RESTRICT */ |
| inode->i_nlink = 2; |
| for (i = 1 ; i < NR_TASKS ; i++) |
| if (task[i]) |
| @@ -171,7 +175,11 @@ |
| inode->i_nlink = 2; |
| break; |
| case PROC_SCSI: |
| +#ifdef CONFIG_PROC_RESTRICT |
| + inode->i_mode = S_IFDIR | S_IRUSR | S_IXUSR; |
| +#else |
| inode->i_mode = S_IFDIR | S_IRUGO | S_IXUGO; |
| +#endif /* CONFIG_PROC_RESTRICT */ |
| inode->i_nlink = 2; |
| inode->i_op = &proc_scsi_inode_operations; |
| break; |
| @@ -181,7 +189,11 @@ |
| inode->i_size = (MAP_NR(high_memory) << PAGE_SHIFT) + PAGE_SIZE; |
| break; |
| case PROC_PROFILE: |
| - inode->i_mode = S_IFREG | S_IRUGO | S_IWUSR; |
| +#ifdef CONFIG_PROC_RESTRICT |
| + inode->i_mode = S_IFDIR | S_IRUSR | S_IXUSR; |
| +#else |
| + inode->i_mode = S_IFDIR | S_IRUGO | S_IXUGO; |
| +#endif /* CONFIG_PROC_RESTRICT */ |
| inode->i_op = &proc_profile_inode_operations; |
| inode->i_size = (1+prof_len) * sizeof(unsigned long); |
| break; |
| @@ -203,7 +215,11 @@ |
| return; |
| case PROC_PID_MEM: |
| inode->i_op = &proc_mem_inode_operations; |
| - inode->i_mode = S_IFREG | S_IRUSR | S_IWUSR; |
| +#ifdef CONFIG_PROC_RESTRICT |
| + inode->i_mode = S_IFDIR | S_IRUSR | S_IXUSR; |
| +#else |
| + inode->i_mode = S_IFDIR | S_IRUGO | S_IXUGO; |
| +#endif /* CONFIG_PROC_RESTRICT */ |
| return; |
| case PROC_PID_CWD: |
| case PROC_PID_ROOT: |
| diff -ru linux-stock/include/asm-i386/processor.h linux-patched/include/asm-i386/processor.h |
| --- linux-stock/include/asm-i386/processor.h Tue Mar 11 13:52:29 1997 |
| +++ linux-patched/include/asm-i386/processor.h Tue Nov 11 00:47:04 1997 |
| @@ -9,6 +9,8 @@ |
| |
| #include <asm/vm86.h> |
| #include <asm/math_emu.h> |
| +#include <linux/binfmts.h> |
| +#include <linux/config.h> |
| |
| /* |
| * System setup and hardware bug flags.. |
| @@ -41,6 +43,15 @@ |
| */ |
| #define TASK_SIZE (0xC0000000UL) |
| |
| +#if defined(CONFIG_STACKEXEC) && defined(CONFIG_BINFMT_ELF) |
| +extern struct linux_binfmt elf_format; |
| +#define MMAP_ADDR ( \ |
| + current->binfmt == &elf_format && \ |
| + !(current->flags & PF_STACKEXEC) \ |
| + ? 0x00110000UL \ |
| + : TASK_SIZE / 3 ) |
| +#endif |
| + |
| /* |
| * Size of io_bitmap in longwords: 32 is ports 0-0x3ff. |
| */ |
| @@ -134,14 +145,6 @@ |
| #define alloc_kernel_stack() __get_free_page(GFP_KERNEL) |
| #define free_kernel_stack(page) free_page((page)) |
| |
| -static inline void start_thread(struct pt_regs * regs, unsigned long eip, unsigned long esp) |
| -{ |
| - regs->cs = USER_CS; |
| - regs->ds = regs->es = regs->ss = regs->fs = regs->gs = USER_DS; |
| - regs->eip = eip; |
| - regs->esp = esp; |
| -} |
| - |
| /* |
| * Return saved PC of a blocked thread. |
| */ |
| @@ -151,3 +154,25 @@ |
| } |
| |
| #endif /* __ASM_I386_PROCESSOR_H */ |
| + |
| +#if defined(current) && !defined(__START_THREAD) |
| +#define __START_THREAD |
| + |
| +static inline void start_thread(struct pt_regs * regs, unsigned long eip, unsigned long esp) |
| +{ |
| +#ifdef CONFIG_STACKEXEC |
| + if (current->flags & PF_STACKEXEC) { |
| + regs->cs = USER_HUGE_CS; regs->ss = USER_HUGE_SS; |
| + } else { |
| + regs->cs = USER_CS; regs->ss = USER_DS; |
| + } |
| + regs->ds = regs->es = regs->fs = regs->gs = USER_DS; |
| +#else |
| + regs->cs = USER_CS; |
| + regs->ds = regs->es = regs->fs = regs->gs = regs->ss = USER_DS; |
| +#endif |
| + regs->eip = eip; |
| + regs->esp = esp; |
| +} |
| + |
| +#endif /* __START_THREAD */ |
| diff -ru linux-stock/include/asm-i386/segment.h linux-patched/include/asm-i386/segment.h |
| --- linux-stock/include/asm-i386/segment.h Tue Apr 9 00:35:29 1996 |
| +++ linux-patched/include/asm-i386/segment.h Tue Nov 11 00:47:13 1997 |
| @@ -1,11 +1,27 @@ |
| #ifndef _ASM_SEGMENT_H |
| #define _ASM_SEGMENT_H |
| |
| +#include <linux/config.h> |
| + |
| #define KERNEL_CS 0x10 |
| #define KERNEL_DS 0x18 |
| |
| #define USER_CS 0x23 |
| #define USER_DS 0x2B |
| + |
| +#ifdef CONFIG_STACKEXEC |
| +#define USER_HUGE_CS 0x32 |
| +#define USER_HUGE_SS 0x3A |
| +#else |
| +#define USER_HUGE_CS 0x23 |
| +#define USER_HUGE_SS 0x2B |
| +#endif |
| + |
| +/* |
| + * Magic address to return to the kernel from signal handlers, any address |
| + * beyond user code segment limit will do. |
| + */ |
| +#define MAGIC_SIGRETURN 0xC1428571 |
| |
| #ifndef __ASSEMBLY__ |
| |
| diff -ru linux-stock/include/linux/a.out.h linux-patched/include/linux/a.out.h |
| --- linux-stock/include/linux/a.out.h Sat Aug 17 11:19:28 1996 |
| +++ linux-patched/include/linux/a.out.h Tue Nov 11 00:47:21 1997 |
| @@ -37,6 +37,9 @@ |
| M_MIPS2 = 152, /* MIPS R6000/R4000 binary */ |
| }; |
| |
| +/* Constants for the N_FLAGS field */ |
| +#define F_STACKEXEC 1 /* Executable stack area forced */ |
| + |
| #if !defined (N_MAGIC) |
| #define N_MAGIC(exec) ((exec).a_info & 0xffff) |
| #endif |
| diff -ru linux-stock/include/linux/elf.h linux-patched/include/linux/elf.h |
| --- linux-stock/include/linux/elf.h Sat Aug 10 00:03:15 1996 |
| +++ linux-patched/include/linux/elf.h Tue Nov 11 00:47:39 1997 |
| @@ -57,6 +57,9 @@ |
| */ |
| #define EM_ALPHA 0x9026 |
| |
| +/* Constants for the e_flags field */ |
| +#define EF_STACKEXEC 1 /* Executable stack area forced */ |
| + |
| |
| /* This is the info that is needed to parse the dynamic section of the file */ |
| #define DT_NULL 0 |
| diff -ru linux-stock/include/linux/kernel.h linux-patched/include/linux/kernel.h |
| --- linux-stock/include/linux/kernel.h Thu Aug 14 10:05:47 1997 |
| +++ linux-patched/include/linux/kernel.h Tue Nov 11 00:47:44 1997 |
| @@ -78,6 +78,27 @@ |
| (((addr) >> 16) & 0xff), \ |
| (((addr) >> 24) & 0xff) |
| |
| +#define security_alert(msg) { \ |
| + static unsigned long warning_time = 0, no_flood_yet = 0; \ |
| +\ |
| +/* Make sure at least one minute passed since the last warning logged */ \ |
| + if (!warning_time || jiffies - warning_time > 60 * HZ) { \ |
| + warning_time = jiffies; no_flood_yet = 1; \ |
| + printk( \ |
| + KERN_ALERT \ |
| + "Possible " msg " exploit attempt:\n" \ |
| + KERN_ALERT \ |
| + "Process %s (pid %d, uid %d, euid %d).\n", \ |
| + current->comm, current->pid, \ |
| + current->uid, current->euid); \ |
| + } else if (no_flood_yet) { \ |
| + warning_time = jiffies; no_flood_yet = 0; \ |
| + printk( \ |
| + KERN_ALERT \ |
| + "More possible " msg " exploit attempts follow.\n"); \ |
| + } \ |
| +} |
| + |
| #endif /* __KERNEL__ */ |
| |
| #define SI_LOAD_SHIFT 16 |
| diff -ru linux-stock/include/linux/sched.h linux-patched/include/linux/sched.h |
| --- linux-stock/include/linux/sched.h Wed Oct 15 15:22:05 1997 |
| +++ linux-patched/include/linux/sched.h Tue Nov 11 00:47:48 1997 |
| @@ -269,6 +269,8 @@ |
| #define PF_USEDFPU 0x00100000 /* Process used the FPU this quantum (SMP only) */ |
| #define PF_DTRACE 0x00200000 /* delayed trace (used on m68k) */ |
| |
| +#define PF_STACKEXEC 0x01000000 /* Executable stack area forced */ |
| + |
| /* |
| * Limit the stack by to some sane default: root can always |
| * increase this limit if needed.. 8MB seems reasonable. |
| @@ -490,6 +492,9 @@ |
| |
| #define for_each_task(p) \ |
| for (p = &init_task ; (p = p->next_task) != &init_task ; ) |
| + |
| +/* x86 start_thread() */ |
| +#include <asm/processor.h> |
| |
| #endif /* __KERNEL__ */ |
| |
| diff -ru linux-stock/kernel/sched.c linux-patched/kernel/sched.c |
| --- linux-stock/kernel/sched.c Fri Oct 17 13:17:43 1997 |
| +++ linux-patched/kernel/sched.c Sun Nov 9 01:11:01 1997 |
| @@ -44,7 +44,11 @@ |
| * kernel variables |
| */ |
| |
| +#ifdef CONFIG_SECURE_ON |
| +int securelevel = 1; /* system security level */ |
| +#else |
| int securelevel = 0; /* system security level */ |
| +#endif |
| |
| long tick = (1000000 + HZ/2) / HZ; /* timer interrupt period */ |
| volatile struct timeval xtime; /* The current time */ |
| diff -ru linux-stock/mm/mmap.c linux-patched/mm/mmap.c |
| --- linux-stock/mm/mmap.c Fri Nov 22 06:25:17 1996 |
| +++ linux-patched/mm/mmap.c Tue Nov 11 00:48:26 1997 |
| @@ -308,7 +308,11 @@ |
| if (len > TASK_SIZE) |
| return 0; |
| if (!addr) |
| +#ifdef MMAP_ADDR |
| + addr = MMAP_ADDR; |
| +#else |
| addr = TASK_SIZE / 3; |
| +#endif |
| addr = PAGE_ALIGN(addr); |
| |
| for (vmm = find_vma(current->mm, addr); ; vmm = vmm->vm_next) { |
|
|
|
|
| diff -ru linux-stock/net/ipv4/af_inet.c linux-patched/net/ipv4/af_inet.c |
| --- linux/net/ipv4/af_inet.c Fri Aug 15 12:23:23 1997 |
| +++ linux-stock/net/ipv4/af_inet.c Mon Dec 29 18:05:29 1997 |
| @@ -111,6 +111,15 @@ |
| |
| #define min(a,b) ((a)<(b)?(a):(b)) |
| |
| +#ifdef CONFIG_SPLIT_GID |
| +/* |
| + * Priveleged group ids |
| + */ |
| +#define PROT_SOCK_GID 16 |
| +#define RAW_SOCK_GID 17 |
| +#define PACKET_SOCK_GID 18 |
| +#endif /* CONFIG_SPLIT_GID */ |
| + |
| extern struct proto packet_prot; |
| extern int raw_get_info(char *, char **, off_t, int, int); |
| extern int snmp_get_info(char *, char **, off_t, int, int); |
| @@ -435,8 +444,26 @@ |
| sk->no_check = UDP_NO_CHECK; |
| prot=&udp_prot; |
| } else if(sock->type == SOCK_RAW || sock->type == SOCK_PACKET) { |
| +#ifdef CONFIG_SPLIT_GID |
| + /* |
| + * If we are not the super user, check to see if we have the |
| + * corresponding special group priviledge. |
| + */ |
| + if (!suser()) |
| + { |
| + if (sock->type == SOCK_RAW && current->egid != RAW_SOCK_GID) |
| + { |
| + goto free_and_badperm; |
| + } |
| + else if (sock->type == SOCK_PACKET && current->egid != PACKET_SOCK_GID) |
| + { |
| + goto free_and_badperm; |
| + } |
| + } |
| +#else |
| if (!suser()) |
| goto free_and_badperm; |
| +#endif /* CONFIG_SPLIT_GID */ |
| if (!protocol) |
| goto free_and_noproto; |
| prot = &raw_prot; |
| @@ -621,7 +648,11 @@ |
| if (snum == 0) |
| snum = sk->prot->good_socknum(); |
| if (snum < PROT_SOCK) { |
| +#ifdef CONFIG_SPLIT_GID |
| + if (!suser() && current->egid != PROT_SOCK_GID) |
| +#else |
| if (!suser()) |
| +#endif /* CONFIG_SPLIT_GID */ |
| return(-EACCES); |
| if (snum == 0) |
| return(-EAGAIN); |
| <--> |
|
|
|
|
| ----[ EOF |
|
|
|
|