1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
|
/* $OpenBSD: setresuid.c,v 1.3 2021/12/15 18:42:38 anton Exp $ */
/*
* Written by Bret Stephen Lambert <blambert@openbsd.org> 2014
* Public Domain.
*/
#include <sys/types.h>
#include <sys/signal.h>
#include <sys/proc.h>
#include <sys/sysctl.h>
#include <sys/wait.h>
#include <err.h>
#include <stdio.h>
#include <stdlib.h>
#include <pwd.h>
#include <unistd.h>
#include "setuid_regress.h"
int
main(int argc, const char *argv[])
{
struct kinfo_proc kproc;
struct passwd *pw;
uid_t uid;
if ((pw = getpwnam(_SETUID_REGRESS_USER)) == NULL)
err(1, "unknown user \"%s\"", _SETUID_REGRESS_USER);
uid = getuid();
if (setresuid(pw->pw_uid, -1, -1) == -1)
err(1, "setuid 0");
checkuids(pw->pw_uid, uid, uid, "0");
/* should only respond to setuid upon exec */
if (issetugid())
errx(1, "process incorrectly marked as issetugid()");
if (read_kproc_pid(&kproc, getpid()) == -1)
err(1, "kproc read failed");
if (!(kproc.p_psflags & PS_SUGID))
errx(1, "PS_SUGID not set");
if (kproc.p_psflags & PS_SUGIDEXEC)
errx(1, "PS_SUGIDEXEC incorrectly set");
/* we should be able to roll back our uids for now */
if (setresuid(uid, -1, -1) == -1)
err(1, "setuid 1");
checkuids(uid, uid, uid, "1");
if (setresuid(-1, pw->pw_uid, -1) == -1)
err(1, "setuid 2");
checkuids(uid, pw->pw_uid, uid, "2");
/* we should be able to roll back our uids for now */
if (setresuid(-1, uid, -1) == -1)
err(1, "setuid 3");
checkuids(uid, uid, uid, "3");
/*
* after changing our saved uid, we should be able to change
* our real and effective uids to that of our saved uid,
* but not to anything else
*/
if (setresuid(-1, -1, pw->pw_uid) == -1)
err(1, "setuid 4");
checkuids(uid, uid, pw->pw_uid, "4");
if (setresuid(pw->pw_uid, -1, -1) == -1)
err(1, "setuid 5");
checkuids(pw->pw_uid, uid, pw->pw_uid, "5");
if (setresuid(-1, pw->pw_uid, -1) == -1)
err(1, "setuid 6");
checkuids(pw->pw_uid, pw->pw_uid, pw->pw_uid, "6");
if (setresuid(uid, -1, -1) != -1)
errx(1, "incorrectly capable of setting real uid");
checkuids(pw->pw_uid, pw->pw_uid, pw->pw_uid, "7");
if (setresuid(-1, uid, -1) != -1)
errx(1, "incorrectly capable of setting effective uid");
checkuids(pw->pw_uid, pw->pw_uid, pw->pw_uid, "9");
if (setresuid(-1, -1, uid) != -1)
errx(1, "incorrectly capable of setting saved uid");
checkuids(pw->pw_uid, pw->pw_uid, pw->pw_uid, "9");
/* sanity-check use of -1 as noop */
if (setresuid(-1, -1, -1) == -1)
errx(1, "-1 not properly recognized as noop");
checkuids(pw->pw_uid, pw->pw_uid, pw->pw_uid, "9");
exit(0);
}
|