Open-Source-Software-Entwicklung und Downloads

Browse Subversion Repository

Diff of /trunk/1.6.x/ccs-patch/README.ccs

Parent Directory Parent Directory | Revision Log Revision Log | View Patch Patch

trunk/1.5.x/ccs-patch/README.ccs revision 860 by kumaneko, Fri Jan 4 04:41:41 2008 UTC trunk/1.6.x/ccs-patch/README.ccs revision 987 by kumaneko, Thu Feb 14 08:30:47 2008 UTC
# Line 1101  Fix 2007/12/18 Line 1101  Fix 2007/12/18
1101        To my surprise, "mount --bind source dest" accepts        To my surprise, "mount --bind source dest" accepts
1102        not only "both source and dest are directory"        not only "both source and dest are directory"
1103        but also "both source and dest are non-directory".        but also "both source and dest are non-directory".
1104        I was rejecting if dest is not a derectory in AddMountACL().        I was rejecting if dest is not a directory in AddMountACL().
1105    
1106      @ Change log format.      @ Change log format.
1107    
# Line 1127  Fix 2008/01/03 Line 1127  Fix 2008/01/03
1127        common part.        common part.
1128    
1129        These changes will reduce memory used by policy.        These changes will reduce memory used by policy.
1130    
1131    Fix 2008/01/15
1132    
1133        @ Add ptrace() hook.
1134    
1135          To prevent attackers from controlling important processes using
1136          ptrace(), I added a hook for ptrace().
1137          Most programs (except strace(1) and gdb(1)) won't use ptrace(2).
1138    
1139        @ Fix sleep condition check in CheckSocketRecvDatagramPermission().
1140    
1141          It seems that correct method to use is in_atomic()
1142          rather than in_interrupt() because in_atomic() returns nonzero
1143          whenever scheduling is not allowed.
1144    
1145    Fix 2008/01/24
1146    
1147        @ Support /proc/ccs/ access by non-root user.
1148    
1149          Until now, only root user can access /proc/ccs/ interface.
1150          But to permit /proc/ccs/ access by non-root user so that
1151          it won't require ssh login by root user when administrating
1152          from remote host, I eased restrictions on this interface.
1153    
1154               (current->uid == 0 && current->euid == 0) ||
1155               (current->uid != 0 && current->uid == inode->i_uid) ||
1156               (current->gid != 0 && current->gid == inode->i_gid)
1157    
1158          The inode's uid and gid are set using chown/chgrp commands.
1159    
1160    Fix 2008/02/05
1161    
1162        @ Use find_task_by_vpid() instead of find_task_pid().
1163    
1164          Kernel 2.6.24 introduced PID namespace.
1165          To search PID given from userland, the kernel needs to use
1166          find_task_by_vpid() instead of find_task_pid().
1167    
1168    Fix 2008/02/14
1169    
1170        @ Add execve() parameter checking.
1171    
1172          Until now, it was impossible to check argv[] and envp[] parameters
1173          passed to execve().
1174          I expanded conditional permission syntax so that
1175          { argc, envc, argv[] , envp[] } parameters can be checked if needed.
1176          This will allow administrator permit execution of /bin/sh only when
1177          /bin/sh is invoked in the form of "/bin/sh -c" and environment variable
1178          HOME is set by specifying
1179    
1180            allow_execute /bin/sh if exec.argv[1]="-c" exec.envp["HOME"]!=NULL
1181    
1182          in the policy.
1183          This extension will make exploit codes difficult to start /bin/sh because
1184          they unlikely set up environment variables and unlikely specify "-c"
1185          option when invoking /bin/sh , whereas proper functions likely set up
1186          environment variables and likely specify "-c" option.

Legend:
Removed from v.860  
changed lines
  Added in v.987

Back to OSDN">Back to OSDN
ViewVC Help
Powered by ViewVC 1.1.26