1 |
# ChangeLog for Path Sandbox |
2 |
# Copyright 1999-2004 Gentoo Foundation; Distributed under the GPL v2 |
3 |
# $Header$ |
4 |
|
5 |
20 Nov 2004; Brian Harring <ferringb@gentoo.org> Makefile.am, configure.in, |
6 |
sandbox_futils.c: tweaks to install sandbox.bashrc, and use it. |
7 |
|
8 |
19 Nov 2004; Brian Harring <ferringb@gentoo.org>: |
9 |
Sandbox is now autotooled, create-localdecls needs to be killed and the code |
10 |
shifted into configure.in. Currently builds *one* libsandbox.so- if multiple |
11 |
are desired (-m64 and -m32 for amd64), the ebuild should do it (imo). |
12 |
To get to a point of testing, automake && autoconf; created requisite files w/ |
13 |
a(utomake|clocal)-1.8, and autoconf 2.59. Installs to /usr/, instead of |
14 |
/lib and /usr/lib/portage/bin. |
15 |
|
16 |
14 Nov 2004; Brian Harring <ferringb@gentoo.org> libsandbox.c, sandbox.c: |
17 |
closing out bug #70225, potential overflow of the sandbox_pids_file var. |
18 |
|
19 |
07 Nov 2004; Brian Harring <ferringb@gentoo.org> libsandbox.c: c99 standard, |
20 |
(think it was at least) allows intermixing of code and data segments. bug #70351 |
21 |
should be fixed by this. |
22 |
|
23 |
03 Nov 2004; Brian Harring <ferringb@gentoo.org> libsandbox.c, sandbox_futils.c: |
24 |
futils fix from bug #65201 via solar, and libsandbox log path checks via #69137 |
25 |
|
26 |
02 Aug 2004; Nicholas Jones <carpaski@gentoo.org> libsandbox.c: Code from |
27 |
Seth Robertson that tracked down all adjuct flags for read operations that |
28 |
do not invoke a write operation. |
29 |
|
30 |
04 Apr 2004; Nicholas Jones <carpaski@gentoo.org> libsandbox.c, sandbox.c: |
31 |
Another fix from jstubbs regarding a free() on a stack variable for the |
32 |
environment -- tracking now prevents extraneous free()'s segfault. |
33 |
|
34 |
04 Apr 2004; Nicholas Jones <carpaski@gentoo.org> libsandbox.c, sandbox.c: |
35 |
J. Stubbs tracked down a new bug where mkdir was failing to the patch on |
36 |
the lstat in mkdir... it now only returns 0 or -1 as documented for mkdir. |
37 |
Also remove the errno = ESUCCESS settings as documentation points out that |
38 |
a library isn't allowed to do that. |
39 |
|
40 |
04 Apr 2004; Nicholas Jones <carpaski@gentoo.org> libsandbox.c: Added a |
41 |
file_security_check() function to check random potential exploits on files |
42 |
that sandbox is to load and read -- Normally sandboxpids.tmp. This fixes |
43 |
the 'system-crippling' exploits (bug 21923) and catches a few other |
44 |
potential problems. |
45 |
|
46 |
20 Mar 2004; Nicholas Jones <carpaski@gentoo.org> Makefile: Updates for |
47 |
32/64 bit sandbox. Made CC and LD '?=' values to allow passed in CC to work. |
48 |
|
49 |
20 Mar 2004; Nicholas Jones <carpaski@gentoo.org> libsandbox.c: |
50 |
bug 42048 -- Fixed the lstat/errno conditions for mkdir <caleb@g.o>. |
51 |
Added the 64/32 bit sandbox patch for AMD64 bug 32963 <brad/azarah>. |
52 |
|
53 |
29 Feb 2004; Martin Schlemmer <azarah@gentoo.org> sandbox.c, sandbox_futils.c : |
54 |
Fix permissions and group of pids file and logs. Permissions should be 0664 |
55 |
and group should be 'portage'. Bug #34260. |
56 |
|
57 |
28 Feb 2004; Martin Schlemmer <azarah@gentoo.org> libsandbox.c : |
58 |
Besides a small cleanup, redo how we replace LD_PRELOAD in the environ passed |
59 |
to the real execve (in our execve wrapper). Seems that on some arches (sparc |
60 |
among others) do not allow us to tamper with the readonly copy passed to |
61 |
execve, so pass our own copy of the environment. Bug #42290. |
62 |
|
63 |
11 Jan 2004; Nicholas Jones <carpaski@gentoo.org> create-decls: |
64 |
Changed tail to head and added a notice about duration of glibc check. |
65 |
|
66 |
21 Dec 2003; Nicholas Jones <carpaski@gentoo.org> create-decls: |
67 |
Changed the glibc subversion check to use /usr/bin/* instead of /bin/sh |
68 |
as there isn't a guarentee that it is dynamic. |
69 |
|
70 |
02 Nov 2003; Martin Schlemmer <azarah@gentoo.org> libsandbox.c : |
71 |
If 'file' passed to before_syscall(const char *func, const char *file) is |
72 |
invalid, we should set errno to ENOENT, and not EINVAL. This should |
73 |
close bug #32238. |
74 |
|
75 |
14 Oct 2003; Martin Schlemmer <azarah@gentoo.org> libsandbox.c : |
76 |
Fix a bug that occurs mainly on 64bit arch, where the file passed to |
77 |
the functions we wrap, is invalid, and then cause canonicalize to pass |
78 |
garbage to before_syscall(), thanks to great detective work from |
79 |
Andrea Luzzardi <al@sig11.org> (bug #29846). |
80 |
|
81 |
13 Oct 2003; Martin Schlemmer <azarah@gentoo.org> create-localdecls : |
82 |
Add a uClibc detection patch from Peter S. Mazinger <ps.m@gmx.net>. |
83 |
|
84 |
13 Oct 2003; Martin Schlemmer <azarah@gentoo.org> libsandbox.c : |
85 |
Fix a bug in libsandbox.c 's checking in the rename wrapper - it basically |
86 |
only checked the destination patch, and not the source, so we could move |
87 |
a protected file to a unprotected directory, and then delete/modify it. |
88 |
Thanks to Andrea Luzzardi (scox) <al@sig11.org>, bug #30992, for this fix. |
89 |
|
90 |
12 Oct 2003; Nicholas Jones <carpaski@gentoo.org> sandbox.c : |
91 |
Added python2.3 to the predict section/variable. |
92 |
|
93 |
28 Sep 2003; Martin Schlemmer <azarah@gentoo.org> libsandbox.c, sandbox.c, |
94 |
sandbox.h, sandbox_futils.c : |
95 |
Add support to set the pids file via SANDBOX_PIDS_FILE at startup. If |
96 |
it is not set, it will revert to its old value. |
97 |
|
98 |
27 Sep 2003; Martin Schlemmer <azarah@gentoo.org> libsandbox.c : |
99 |
Fix our mkdir wrapper to check if the dir exist, and return EEXIST if so, |
100 |
rather than failing with a violation, bug #29748. |
101 |
|
102 |
27 Jul 2003; Martin Schlemmer <azarah@gentoo.org> libsandbox.c : |
103 |
Fix canonicalize() to ignore calls with path = "". |
104 |
|
105 |
27 Jul 2003; Martin Schlemmer <azarah@gentoo.org> getcwd.c, libsandbox.c, |
106 |
sandbox_futils.c, canonicalize.c : |
107 |
Once again coreutils fails, as my systems had 2.5 kernel, the getcwd system |
108 |
call handled strings larger than PATH_MAX (bug #21766). It however does not |
109 |
work the same on 2.4 kernels. |
110 |
|
111 |
To fix, I added the posix implementation of getcwd() (from glibc cvs) that |
112 |
do not need the system call. We use the default getcwd() function via a |
113 |
wrapper (egetcwd), and then lstat the returned path. If lstat fails, it |
114 |
means the current directory was removed, OR that the the system call for |
115 |
getcwd failed (curious is that it do not fail and return NULL or set |
116 |
errno, but rather just truncate the retured directory - usually from the |
117 |
start), and if so, we use the generic getcwd() function (__egetcwd). Note |
118 |
that we do not use the generic version all the time, as it calls lstat() |
119 |
a great number of times, and performance degrade much. |
120 |
|
121 |
29 Jun 2003; Martin Schlemmer <azarah@gentoo.org> create-localdecls, |
122 |
libsandbox.c : |
123 |
Make sure SB_PATH_MAX will not wrap. Fix two possible memory leaks. |
124 |
|
125 |
22 Jun 2003; Martin Schlemmer <azarah@gentoo.org> libsandbox.c, canonicalize.c |
126 |
create-localdecls : |
127 |
When checking path names of files accessed, we need to canonicalize it, else |
128 |
it may be a symlink in a 'write allowed' directory pointing to a file in a |
129 |
directory we should not have write access to. |
130 |
|
131 |
With something like coreutils-5.0, we have two problems: |
132 |
1) One of the tests checks if getcwd() can return a path longer than |
133 |
PATH_MAX. This test then tries to create a dir which even while |
134 |
created local (mkdir("conftest2")), it ends up being resolved with |
135 |
a name that is much larger than PATH_MAX. The problem now is that |
136 |
canonicalize() have undefined behaviour when the path was too long |
137 |
(returned wrongly truncated paths, etc), and pass the wrong path to |
138 |
before_syscall() (causing the bogus sandbox violations). |
139 |
2) The ecanonicalize() function we used, along with the canonicalize() |
140 |
function did not support longer than PATH_MAX. This is partly a |
141 |
cause for 1), but the error checking (rather lack of it) of calls |
142 |
to erealpath() in canonicalize() was the prime reason for 1). |
143 |
|
144 |
As we do not use this canonicalized name to call the function, we resolve this |
145 |
by fixing canonicalize() to do better error checking, and ecanonicalize() as |
146 |
well as all functions in libsandbox.c to use a PATH_MAX of 'PATH_MAX * 2'. |
147 |
While they will resolve paths properly now, and can check if a write/read is |
148 |
allowed, the functions called from the sandboxed environment will still work |
149 |
as expected. |
150 |
|
151 |
This should resolve bug #21766. |
152 |
|
153 |
06 Apr 2003; Martin Schlemmer <azarah@gentoo.org> libsandbox.c : |
154 |
For some reason sandbox fails with a 'open_wr' if you run 'locale -a' under |
155 |
it (bug #16298). |
156 |
|
157 |
Problem is that for some reason locale fopen's locale.alias with mode "rm". |
158 |
|
159 |
------------------------------------------------------- |
160 |
nosferatu root # grep fopen locale.log |
161 |
fopen("/usr/share/locale/locale.alias", "rm"ACCESS DENIED open_wr: /usr/share/locale/locale.alias |
162 |
nosferatu root # |
163 |
-------------------------------------------------------- |
164 |
|
165 |
I checked the source of locale, but it have fopen with mode 'r', so |
166 |
not sure where the "rm" mode comes from. Anyhow, changed the check in |
167 |
before_syscall_open_char() to also see mode "rm" as readonly. |
168 |
|
169 |
23 Feb 2003; Martin Schlemmer <azarah@gentoo.org> create-localdecls : |
170 |
|
171 |
Add glibc-2.3 support. |
172 |
|
173 |
22 Feb 2003; Martin Schlemmer <azarah@gentoo.org> sandbox.c : |
174 |
|
175 |
Some /etc/ld.so.preload fixes. Just changed the #if defines to cover all |
176 |
operations releated to preload, as well as only try to modify ld.so.preload |
177 |
if we can. Also modify to write the pid to /tmp/sandboxpids.tmp even when |
178 |
not using ld.so.preload. Fix to not write this instance of sandbox's pid |
179 |
to /tmp/sandboxpids.tmp on exit if this is not the last sandbox running. |
180 |
|
181 |
22 Feb 2003; Nicholas Jones <carpaski@gentoo.org> Makefile : |
182 |
|
183 |
Changed the LD to CC for hppa. |
184 |
|
185 |
22 Feb 2003; Nicholas Jones <carpaski@gentoo.org> create-localdecls : |
186 |
|
187 |
Killed the previous changes I made. |
188 |
|
189 |
17 Feb 2003; Nicholas Jones <carpaski@gentoo.org> create-localdecls : |
190 |
|
191 |
Added parisc to BROKEN_RTLD_ARCHLIST to see if it we can fix the relocation probs. |
192 |
|
193 |
09 Jan 2003; J Robert Ray <jrray@gentoo.org> sandbox.c : |
194 |
|
195 |
Don't segfault if $HOME isn't set, set $HOME to "/" instead. Fixes bug 10868. |
196 |
|
197 |
16 Dec 2002; Martin Schlemmer <azarah@gentoo.org> create-localdecls : |
198 |
|
199 |
Fix memory leak for mips, bug #12236. Thanks to Torgeir Hansen <torgeir@trenger.ro> |
200 |
for this fix. |
201 |
|
202 |
4 Dec 2002; J Robert Ray <jrray@gentoo.org> sandbox.h sandbox_futils.c : |
203 |
|
204 |
sandbox_futils defined a dirname() function that was masking the same |
205 |
function in glibc and was broken (e.g.: SANDBOX_DIR was being set to |
206 |
'/usr/lib/portage/bi/'). Fixed function to return expected results and |
207 |
renamed it to sb_dirname() to no longer mask the glibc function. Closes bug |
208 |
11231. |
209 |
|
210 |
4 Dec 2002; Martin Schlemmer <azarah@gentoo.org> : |
211 |
|
212 |
Fix a segfault in libsandbox.c if canonicalize() was called with |
213 |
first parameter = NULL. |
214 |
|
215 |
1 Sep 2002; Martin Schlemmer <azarah@gentoo.org> : |
216 |
|
217 |
Fix my braindead 'return 1;' in a void function. Updated sandbox.c, |
218 |
cleanup() for this. |
219 |
|
220 |
Change cleanup() in sandbox.c not to exit with fail status if |
221 |
the pidsfile is missing. We really should still display sandbox |
222 |
violations if they occured. |
223 |
|
224 |
31 Aug 2002; Martin Schlemmer <azarah@gentoo.org> : |
225 |
|
226 |
Update cleanup() in sandbox.c to remove the PIDSFILE if this is |
227 |
the last sandbox running. |
228 |
|
229 |
25 Aug 2002; Martin Schlemmer <azarah@gentoo.org> : |
230 |
|
231 |
Major cleanups to mainly libsandbox.c again. |
232 |
|
233 |
22 Aug 2002; Martin Schlemmer <azarah@gentoo.org> : |
234 |
|
235 |
Add copyrights to sandbox.h and sandbox_futils.h. If wrong, the |
236 |
parties involved should please contact me so that we can fix it. |
237 |
|
238 |
Add opendir wrapper to libsandbox.c. |
239 |
|
240 |
21 Aug 2002; Martin Schlemmer <azarah@gentoo.org> : |
241 |
|
242 |
Do some more cleanups to ecanonicalize(), as it dropped filenames in |
243 |
rare cases (after my symlink cleanups), and caused glibc to bork. |
244 |
These fixes went into canonicalize.c. |
245 |
|
246 |
20 Aug 2002; Martin Schlemmer <azarah@gentoo.org> : |
247 |
|
248 |
Fix spawn_shell() and main() in sandbox.c to properly return fail |
249 |
status. |
250 |
|
251 |
19 Aug 2002; Martin Schlemmer <azarah@gentoo.org> : |
252 |
|
253 |
The new canonicalize() function in libsandbox.c also resolved symlinks, |
254 |
which caused on cleaning sandbox errors if the symlink pointed to a |
255 |
file in the live root. Ripped out canonicalize() and realpath() from |
256 |
glibc; removed the symlink stuff, and changed them to ecanonicalize() |
257 |
and erealpath(). |
258 |
|
259 |
18 Aug 2002; Martin Schlemmer <azarah@gentoo.org> : |
260 |
|
261 |
Ripped out all the wrappers, and implemented those of InstallWatch. |
262 |
Losts of cleanups and bugfixes. Implement a execve that forces |
263 |
$LIBSANDBOX in $LD_PRELOAD. We can now thus do away with the feared |
264 |
/etc/ld.so.preload (*g*) ... Made the needed changes to sandbox.c, |
265 |
sandbox.h and sandbox_futils.c. Rewrote the Makefile for most |
266 |
parts; it now have an install target. |
267 |
|
268 |
Reformat the whole thing to look somewhat like the reworked sandbox.c |
269 |
and new sandbox.h and sandbox_futils.c from: |
270 |
|
271 |
Brad House <brad@mainstreetsoftworks.com>. |
272 |
|
273 |
Additional Copyrights now due to the InstallWatch code: |
274 |
|
275 |
Copyright (C) 1998-9 Pancrazio `Ezio' de Mauro <p@demauro.net> |