From mboxrd@z Thu Jan 1 00:00:00 1970 From: Michael Tremer To: development@lists.ipfire.org Subject: Re: [PATCH] libcap: Update to version 2.61 Date: Sun, 28 Nov 2021 12:02:38 +0000 Message-ID: In-Reply-To: <20211127133555.3522239-1-adolf.belka@ipfire.org> MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="===============5635906142684196670==" List-Id: --===============5635906142684196670== Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Reviewed-by: Michael Tremer > On 27 Nov 2021, at 13:35, Adolf Belka wrote: >=20 > - Update from 2.50 to 2.61 > - Update of rootfile > - Changelog > Release notes for 2.61 > Better error handling of the numerical arguments for capsh and setcap. > Reported by meitingli with some bug de-duping help from Artem S. Tas= hkinov (Bugs 214909, 214911) > Fix executable mode for all of the .so files. There were two situations = where this was failing (with a hard to debug SIGSEGV inside libc). Bugs repor= ted by Sam James. Both the same solution related to stack alignment and use o= f SSE instructions: > glibc and the 32-bit x86 mode (Gentoo bug 820071) > musl runtime library for 64-bit x86 code (Bug 215009) > Added an example of a shared library object with its own file capability. > It demonstrates how to give a shared library a file capability and o= ffer it as a linkable privileged API service to an otherwise unprivileged bin= ary. > Fix the top-level include for Make.Rules in the contrib/sucap example ap= plication > Add support for running constructors at libcap.so start up time when run= ning as stand alone binary. > This enables the binary executable to print out some dynamically gen= erated content when given the --summary argument. > Release notes for 2.60 > Some build, code linting fixes, the addition of the cap_fill_flag() API = and a memory latency optimization contributed by Google (Bugs: 214579 214601 = 214599) > General improvement in thread safety for libcap and cap package (Bug: 21= 4715) > Minor API change replacing libcap:cap_launch_*() void returning function= s with int + errno status returns. > This should be backwardly compatible for code. > Added a cap_iab_dup(), and (*cap.IAB).Dup() to API. > Fixed (*cap.IAB).Fill() which was previously malfunctioning for cert= ain Inh and Amb copies. > New features for capsh > --quiet can be used to suppress the start up check that the local li= bcap is modern enough to name all of the capabilities known to the hosting ke= rnel > Added -+ and =3D+ arguments. These are fork+exec equivalents to -- a= nd =3D=3D respectively (that use the cap_launch API). > Release notes for 2.59 > libcap-2.55 ... 2.58 would SIGSEGV if an operation was attempted on a NU= LL value for cap_t or cap_iab_t. Restore the more tolerant error return behav= ior last seen with libcap-2.54. (Bug 214525) > More make -j13 fixes (missing dependency for make -C progs sudotest). > Various minor documentation fixes. > Release notes for 2.58 > Fixed a potential libcap memory leak by adding a destructor (Bug 214373 = reported by yan12125) > Major improvement is that there is a path for Linux-PAM compliant applic= ations to support setting Ambient vector Capabilities via pam_cap.so now (Bug= 214377) > In addition to the bug, related discussion is in two Github issues: = https://github.com/shadow-maint/shadow/pull/408#issuecomment-919673098 and ht= tps://github.com/rra/pam-krb5/issues/21 > Added support for RPM builds that generate the build-id that RPM expects= (see https://github.com/rpm-software-management/rpm/issues/367 for discussio= n) > Minor contrib/sucap/su.c cleanups > Clean up kdebug build rules > More documentation cleanup > Release notes for 2.57 > capsh enhancements: > --mode makes a guess at the libcap mode of the current process (Bug = 214319) > --strict makes capsh less permissive and expects the user to perform= more deliberate capability transactions > useful for learning all the steps; and helps this article be mor= e pedagogical. > Build system fixes > Preserve $(WARNINGS) (Fix from David Seifert) > Don't ever build test binaries unless make test etc is invoked (spee= ds builds on slower systems) > Support make -j12 for all, test and sudotest targets > getcap -r / now generates readable output (Bug 214317) > Some documentation cleanup: more consistency. > Release notes for 2.56 > Canonicalize the Makefile use (in collaboration with David Seifert) > In the process fixed a bug in pam_cap/test_pam_cap (reported by Davi= d Seifert, Bug 214257) > Doc fixes for cap_iab.3 > Added color support to captree, which helped make the following fix gene= rate readable output: > Fixed captree to not display duplicate copies of sub-trees if also e= xploring their ancestor (Bug 214269) > Fixed contrib/sucap/su to correctly handle the Inheritable flag. > Release notes for 2.55 > Two rounds of fixes for the results of some static analysis performed by= Zoltan Fridrich > Removed a clang compilation warning about memory allocation by rewriting= the way cap_free() and the various libcap memory allocation mechanisms work.= (Bug 214183) > This generated a few broken builds until it was fixed. > Cleanup of some man pages; some fixes and shorter URL to bugzilla link. > Added libcap cap_proc_root() API function (to reach parity with the Go c= ap package). > This is only potentially useful with the recently added cap_iab_get_= pid() function > Revamped what the GOLANG=3Dyes builds install - used to install local co= pies of cap and psx, but these were effectively useless because of the Go mod= ule support in recent Go releases in favor of user controller GOPATH. > Now make GOLANG=3Dyes only installs the captree utility > Added some features to captree and created a small article on it > Added a man page for the captree utility > Some small changes to the tests to account for the idiosyncrasies of som= e new testing environments I've accumulated. > Included adding --has-b support to capsh > Release notes for 2.54 > Fix for a corner case infinite loop handling long strings (patch provide= d by Samanta Navarro) > Fixes to not ignore allocation failures (patch provided by Samanta Navar= ro) > Evolving work from Samanta Navarro, found and fixed a memory leak in cap= _iab_get_proc() > More robust discovery of the name of the dynamic loader of the build tar= get (patch provided by Arnout Vandecappelle) > Revamped the Go capability comparison API for *cap.Set and *cap.IAB: (x)= .Cf(), and added cap.IABGetPID() > Added libcap cap_iab_compare() and cap_iab_get_pid() APIs. > Added a Go utility, captree, to display the process (and thread) graph a= long with the POSIX.1e and IAB capabilities of each PID{TID} tree. > Extended getpcaps to support the --iab command line argument, which = outputs a PID's IAB tuple too (if non-default). > Install *.so files as executable now that they are executable as binaries > A feature of 2.52 but not extended to install rules at that time. > Absorbed a lot of wisdom from a number of downstream package workarounds= including wisdom from (Zhi Li and Arnout Vandecappelle and unknown others...= Bugs 214023#c16, 214085) > Support make FORCELINKPAM=3Dyes or make FORCELINKPAM=3Dno for those = packagers that feel strongly about not letting this be dynamically discovered= at build time. > Fixed a compiler warnings from the GitHub build tester (Bug 214143) > Release notes for 2.53 > The (C) cap_launch functionality was previously broken when launches fai= led (found and fixed by Samanta Navarro) > Added a test case for this too. > Lots of tyops fixed in code and documentation (also by Samanta Navarro) > Support distributions that aggressively link shared objects (reported by= David Runge; Bug 214023) > These distributions failed to observe a runnable pam_cap.so and vari= ous make options failed. > Support clang builds (again). (Reported by Johan Herland 214047) > This used to work, but by accident. It broke with the advent of a ru= nnable libcap.so , libpsx.so and pam_cap.so support. Fixed now, and added a b= uild target to validate it still works at release time. > Minor documentation updates including one for Slavi Marinov who was tryi= ng to get cap.LaunchFunc() to work. > Worked up a couple of example modifications to goapps/web to demonst= rate a different user per web query and enabling a custom chroot per web quer= y. > Release notes for 2.52 > Revived -std=3Dc89 compilation for make all etc. (Bug 213541 reported by= Byron Stanoszek.) > The shared library objects: pam_cap.so, libcap.so and libpsx.so, are all= now runnable as standalone binaries! > The support is used to display some description information. > To activate it, these binaries need to be installed executable (chmo= d +x ...) > We also provided a write-up of how to enable this sort of feature in= other .so files here. > The module pam_cap.so now contains support for a default=3D module = argument. (Bug 213611). > Enhanced capsh --suggest to also compare against the capability value na= mes and not just their descriptions. > Added capsh --current support. > Minor documentation updates. > Added a contrib/sucap/su.c pure-capabilities PAM implementation of su. > This is primarily to demonstrate that such a thing is possible, and = to validate that the pam_cap.so module is capable of adding any IAB tuple of = inheritables per group or user. > At this time, it relies on features only present in this version of = libcap and HEAD of the Linux-PAM sources for the pam_unix.so module. > Release notes for 2.51 > Fix capsh installation (Bug 213261 - reported by Jan Palus) > Add an autoauth module flag to pam_cap.so (Bug 213279 - noted a feature = request hidden in StackExchange) > Unified libcap/cap (Go) and libcap (C) default generation of external fo= rmat binary data (Bug 213375 - addressing an issue raised by Mike Schilling) > This standard binary format should be forwards/backwards compatible = with earlier libcap2 builds and libcap/cap packages > API enhancement cap_fill() and (*cap.Set).Fill() - to permit copying one= capability flag to another. > This can be used to raise all the Permitted capabilities in a Set wi= th one API call. > In tree build/run/test of Go packages now uses Go module vendoring (Bug = 212453). > This is with an eye to the imminent golang change removing support f= or GOPATH based building. > Minor compilation warning fixes >=20 > Signed-off-by: Adolf Belka > --- > config/rootfiles/common/libcap | 10 ++++++++-- > lfs/libcap | 7 +++---- > 2 files changed, 11 insertions(+), 6 deletions(-) >=20 > diff --git a/config/rootfiles/common/libcap b/config/rootfiles/common/libcap > index def30cb5a..c33222c49 100644 > --- a/config/rootfiles/common/libcap > +++ b/config/rootfiles/common/libcap > @@ -1,10 +1,10 @@ > #lib/libcap.a > lib/libcap.so.2 > -lib/libcap.so.2.50 > +lib/libcap.so.2.61 > #lib/libpsx.a > #lib/libpsx.so > #lib/libpsx.so.2 > -#lib/libpsx.so.2.50 > +#lib/libpsx.so.2.61 > #lib/pkgconfig/libcap.pc > #lib/pkgconfig/libpsx.pc > lib/security/pam_cap.so > @@ -23,6 +23,8 @@ usr/lib/libcap.so > #usr/share/man/man3/cap_copy_int.3 > #usr/share/man/man3/cap_drop_bound.3 > #usr/share/man/man3/cap_dup.3 > +#usr/share/man/man3/cap_fill.3 > +#usr/share/man/man3/cap_fill_flag.3 > #usr/share/man/man3/cap_free.3 > #usr/share/man/man3/cap_from_name.3 > #usr/share/man/man3/cap_from_text.3 > @@ -36,8 +38,11 @@ usr/lib/libcap.so > #usr/share/man/man3/cap_get_proc.3 > #usr/share/man/man3/cap_get_secbits.3 > #usr/share/man/man3/cap_iab.3 > +#usr/share/man/man3/cap_iab_compare.3 > +#usr/share/man/man3/cap_iab_dup.3 > #usr/share/man/man3/cap_iab_fill.3 > #usr/share/man/man3/cap_iab_from_text.3 > +#usr/share/man/man3/cap_iab_get_pid.3 > #usr/share/man/man3/cap_iab_get_proc.3 > #usr/share/man/man3/cap_iab_get_vector.3 > #usr/share/man/man3/cap_iab_init.3 > @@ -73,6 +78,7 @@ usr/lib/libcap.so > #usr/share/man/man3/psx_syscall.3 > #usr/share/man/man3/psx_syscall3.3 > #usr/share/man/man3/psx_syscall6.3 > +#usr/share/man/man8/captree.8 > #usr/share/man/man8/getcap.8 > #usr/share/man/man8/getpcaps.8 > #usr/share/man/man8/setcap.8 > diff --git a/lfs/libcap b/lfs/libcap > index 610ff474b..387d43e38 100644 > --- a/lfs/libcap > +++ b/lfs/libcap > @@ -24,7 +24,7 @@ >=20 > include Config >=20 > -VER =3D 2.50 > +VER =3D 2.61 >=20 > THISAPP =3D libcap-$(VER) > DL_FILE =3D $(THISAPP).tar.xz > @@ -40,7 +40,7 @@ objects =3D $(DL_FILE) >=20 > $(DL_FILE) =3D $(DL_FROM)/$(DL_FILE) >=20 > -$(DL_FILE)_MD5 =3D 66a561afa81666236ff973544ff4e864 > +$(DL_FILE)_MD5 =3D 3bf105e47a8671035a0ce0812185c5e4 >=20 > install : $(TARGET) >=20 > @@ -70,13 +70,12 @@ $(subst %,%_MD5,$(objects)) : > $(TARGET) : $(patsubst %,$(DIR_DL)/%,$(objects)) > @$(PREBUILD) > @rm -rf $(DIR_APP) && cd $(DIR_SRC) && tar axf $(DIR_DL)/$(DL_FILE) > - cd $(DIR_APP) && patch -Np1 -i $(DIR_SRC)/src/patches/libcap-2.50-install= _capsh_again.patch > # Prevent a static library from being installed > cd $(DIR_APP) && sed -i '/install.*STALIBNAME/d' libcap/Makefile > cd $(DIR_APP) && make GOLANG=3Dno > cd $(DIR_APP) && make install GOLANG=3Dno > rm -vf /lib/libcap.so > - ln -svf /lib/libcap.so.2.50 /usr/lib/libcap.so > + ln -svf /lib/libcap.so.2.61 /usr/lib/libcap.so > chmod +x /lib/libcap.so.* > @rm -rf $(DIR_APP) > @$(POSTBUILD) > --=20 > 2.34.0 >=20 --===============5635906142684196670==--