Return to Child.c CVS log | Up to [Pegasus] / pegasus / src / Executor |
File: [Pegasus] / pegasus / src / Executor / Child.c
(download)
Revision: 1.3, Wed May 30 19:41:27 2007 UTC (17 years, 1 month ago) by kumpf Branch: MAIN CVS Tags: TASK-Bug2102Final-root, TASK-Bug2102Final-merged_out_to_branch, TASK-Bug2102Final-merged_out_from_trunk, TASK-Bug2102Final-merged_in_to_trunk, TASK-Bug2102Final-merged_in_from_branch, TASK-Bug2102Final-branch Changes since 1.2: +7 -0 lines BUG#: 6482 TITLE: Provider UserContext should set supplemental groups DESCRIPTION: Use the initgroups() function along with setuid() calls. |
/* //%2006//////////////////////////////////////////////////////////////////////// // // Copyright (c) 2000, 2001, 2002 BMC Software; Hewlett-Packard Development // Company, L.P.; IBM Corp.; The Open Group; Tivoli Systems. // Copyright (c) 2003 BMC Software; Hewlett-Packard Development Company, L.P.; // IBM Corp.; EMC Corporation, The Open Group. // Copyright (c) 2004 BMC Software; Hewlett-Packard Development Company, L.P.; // IBM Corp.; EMC Corporation; VERITAS Software Corporation; The Open Group. // Copyright (c) 2005 Hewlett-Packard Development Company, L.P.; IBM Corp.; // EMC Corporation; VERITAS Software Corporation; The Open Group. // Copyright (c) 2006 Hewlett-Packard Development Company, L.P.; IBM Corp.; // EMC Corporation; Symantec Corporation; The Open Group. // // Permission is hereby granted, free of charge, to any person obtaining a copy // of this software and associated documentation files (the "Software"), to // deal in the Software without restriction, including without limitation the // rights to use, copy, modify, merge, publish, distribute, sublicense, and/or // sell copies of the Software, and to permit persons to whom the Software is // furnished to do so, subject to the following conditions: // // THE ABOVE COPYRIGHT NOTICE AND THIS PERMISSION NOTICE SHALL BE INCLUDED IN // ALL COPIES OR SUBSTANTIAL PORTIONS OF THE SOFTWARE. THE SOFTWARE IS PROVIDED // "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT // LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR // PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT // HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN // ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION // WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. // //%///////////////////////////////////////////////////////////////////////////// */ #include <sys/types.h> #include <sys/stat.h> #include <unistd.h> #include <stdlib.h> #include <string.h> #include <stdio.h> #include <grp.h> #include "Defines.h" #include "Fatal.h" #include "Path.h" #include "Log.h" #include "User.h" /* **============================================================================== ** ** Child ** ** The child process. ** **============================================================================== */ void Child( int argc, char** argv, const char* path, const char* userName, int uid, int gid, int sock) { char sockStr[EXECUTOR_BUFFER_SIZE]; char username[EXECUTOR_BUFFER_SIZE]; char** execArgv; /* Build argument list, adding "--executor-socket <sock>" option if * sock non-negative. */ execArgv = (char**)malloc(sizeof(char*) * (argc + 3)); memcpy(execArgv + 3, argv + 1, sizeof(char*) * argc); sprintf(sockStr, "%d", sock); execArgv[0] = CIMSERVERMAIN; execArgv[1] = "--executor-socket"; execArgv[2] = strdup(sockStr); /* * Downgrade privileges by setting the UID and GID of this process. Use * the owner of the CIMSERVERMAIN program obtained above. */ if (uid == 0 || gid == 0) { Fatal(FL, "root may not own %s since the program is run as owner", path); } if (setgid(gid) != 0) { Fatal(FL, "Failed to set gid to %d", gid); } if (initgroups(userName, gid) != 0) { Fatal(FL, "Failed to initialize groups for user %s", userName); } if (setuid(uid) != 0) { Fatal(FL, "Failed to set uid to %d", uid); } if ((int)getuid() != uid || (int)geteuid() != uid || (int)getgid() != gid || (int)getegid() != gid) { Fatal(FL, "setuid/setgid verification failed\n"); } /* Log user info. */ if (GetUserName(uid, username) != 0) Fatal(FL, "cannot resolve user from uid=%d", uid); Log(LL_TRACE, "%s running as %s (uid=%d, gid=%d)", CIMSERVERMAIN, username, uid, gid); /* * Precheck that cimxml.socket is owned by CIMSERVERMAIN process. If * not, then the bind would fail in the CIMSERVERMAIN process much * later and the cause of the error would be difficult to determine. */ /* Flawfinder: ignore */ if (access(PEGASUS_LOCAL_DOMAIN_SOCKET_PATH, F_OK) == 0) { struct stat st; if (stat(PEGASUS_LOCAL_DOMAIN_SOCKET_PATH, &st) != 0 || (int)st.st_uid != uid || (int)st.st_gid != gid) { Fatal(FL, "%s process cannot stat or does not own %s", CIMSERVERMAIN, PEGASUS_LOCAL_DOMAIN_SOCKET_PATH); } } /* Exec child process. */ /* Flawfinder: ignore */ if (execv(path, execArgv) != 0) Fatal(FL, "failed to exec %s", path); exit(0); }
No CVS admin address has been configured |
Powered by ViewCVS 0.9.2 |