mirror of
https://github.com/postgres/postgres.git
synced 2025-06-27 23:21:58 +03:00
Backpatch the inheritable-ACE patch for Win32 to 8.2 as well, except
for the pg_regress part which did not support admin execution in 8.2.
This commit is contained in:
@ -42,7 +42,7 @@
|
|||||||
* Portions Copyright (c) 1994, Regents of the University of California
|
* Portions Copyright (c) 1994, Regents of the University of California
|
||||||
* Portions taken from FreeBSD.
|
* Portions taken from FreeBSD.
|
||||||
*
|
*
|
||||||
* $PostgreSQL: pgsql/src/bin/initdb/initdb.c,v 1.125.2.3 2009/03/31 18:58:34 mha Exp $
|
* $PostgreSQL: pgsql/src/bin/initdb/initdb.c,v 1.125.2.4 2009/11/15 09:08:45 mha Exp $
|
||||||
*
|
*
|
||||||
*-------------------------------------------------------------------------
|
*-------------------------------------------------------------------------
|
||||||
*/
|
*/
|
||||||
@ -2336,6 +2336,10 @@ CreateRestrictedProcess(char *cmd, PROCESS_INFORMATION * processInfo)
|
|||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#ifndef __CYGWIN__
|
||||||
|
AddUserToTokenDacl(restrictedToken);
|
||||||
|
#endif
|
||||||
|
|
||||||
if (!CreateProcessAsUser(restrictedToken,
|
if (!CreateProcessAsUser(restrictedToken,
|
||||||
NULL,
|
NULL,
|
||||||
cmd,
|
cmd,
|
||||||
@ -2353,10 +2357,6 @@ CreateRestrictedProcess(char *cmd, PROCESS_INFORMATION * processInfo)
|
|||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
#ifndef __CYGWIN__
|
|
||||||
AddUserToDacl(processInfo->hProcess);
|
|
||||||
#endif
|
|
||||||
|
|
||||||
return ResumeThread(processInfo->hThread);
|
return ResumeThread(processInfo->hThread);
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
|
@ -4,7 +4,7 @@
|
|||||||
*
|
*
|
||||||
* Portions Copyright (c) 1996-2006, PostgreSQL Global Development Group
|
* Portions Copyright (c) 1996-2006, PostgreSQL Global Development Group
|
||||||
*
|
*
|
||||||
* $PostgreSQL: pgsql/src/bin/pg_ctl/pg_ctl.c,v 1.74.2.7 2009/09/02 02:41:13 tgl Exp $
|
* $PostgreSQL: pgsql/src/bin/pg_ctl/pg_ctl.c,v 1.74.2.8 2009/11/15 09:08:46 mha Exp $
|
||||||
*
|
*
|
||||||
*-------------------------------------------------------------------------
|
*-------------------------------------------------------------------------
|
||||||
*/
|
*/
|
||||||
@ -1349,6 +1349,10 @@ CreateRestrictedProcess(char *cmd, PROCESS_INFORMATION * processInfo)
|
|||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#ifndef __CYGWIN__
|
||||||
|
AddUserToTokenDacl(restrictedToken);
|
||||||
|
#endif
|
||||||
|
|
||||||
r = CreateProcessAsUser(restrictedToken, NULL, cmd, NULL, NULL, TRUE, CREATE_SUSPENDED, NULL, NULL, &si, processInfo);
|
r = CreateProcessAsUser(restrictedToken, NULL, cmd, NULL, NULL, TRUE, CREATE_SUSPENDED, NULL, NULL, &si, processInfo);
|
||||||
|
|
||||||
Kernel32Handle = LoadLibrary("KERNEL32.DLL");
|
Kernel32Handle = LoadLibrary("KERNEL32.DLL");
|
||||||
@ -1429,10 +1433,6 @@ CreateRestrictedProcess(char *cmd, PROCESS_INFORMATION * processInfo)
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
#ifndef __CYGWIN__
|
|
||||||
AddUserToDacl(processInfo->hProcess);
|
|
||||||
#endif
|
|
||||||
|
|
||||||
CloseHandle(restrictedToken);
|
CloseHandle(restrictedToken);
|
||||||
|
|
||||||
ResumeThread(processInfo->hThread);
|
ResumeThread(processInfo->hThread);
|
||||||
|
@ -6,7 +6,7 @@
|
|||||||
* Portions Copyright (c) 1996-2006, PostgreSQL Global Development Group
|
* Portions Copyright (c) 1996-2006, PostgreSQL Global Development Group
|
||||||
* Portions Copyright (c) 1994, Regents of the University of California
|
* Portions Copyright (c) 1994, Regents of the University of California
|
||||||
*
|
*
|
||||||
* $PostgreSQL: pgsql/src/include/port.h,v 1.106.2.6 2008/04/16 14:24:38 adunstan Exp $
|
* $PostgreSQL: pgsql/src/include/port.h,v 1.106.2.7 2009/11/15 09:08:46 mha Exp $
|
||||||
*
|
*
|
||||||
*-------------------------------------------------------------------------
|
*-------------------------------------------------------------------------
|
||||||
*/
|
*/
|
||||||
@ -76,7 +76,7 @@ extern int find_other_exec(const char *argv0, const char *target,
|
|||||||
|
|
||||||
/* Windows security token manipulation (in exec.c) */
|
/* Windows security token manipulation (in exec.c) */
|
||||||
#ifdef WIN32
|
#ifdef WIN32
|
||||||
extern BOOL AddUserToDacl(HANDLE hProcess);
|
extern BOOL AddUserToTokenDacl(HANDLE hToken);
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
|
||||||
|
@ -9,7 +9,7 @@
|
|||||||
*
|
*
|
||||||
*
|
*
|
||||||
* IDENTIFICATION
|
* IDENTIFICATION
|
||||||
* $PostgreSQL: pgsql/src/port/exec.c,v 1.43.2.2 2008/03/31 01:32:17 tgl Exp $
|
* $PostgreSQL: pgsql/src/port/exec.c,v 1.43.2.3 2009/11/15 09:08:46 mha Exp $
|
||||||
*
|
*
|
||||||
*-------------------------------------------------------------------------
|
*-------------------------------------------------------------------------
|
||||||
*/
|
*/
|
||||||
@ -649,11 +649,10 @@ set_pglocale_pgservice(const char *argv0, const char *app)
|
|||||||
#ifdef WIN32
|
#ifdef WIN32
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* AddUserToDacl(HANDLE hProcess)
|
* AddUserToTokenDacl(HANDLE hToken)
|
||||||
*
|
*
|
||||||
* This function adds the current user account to the default DACL
|
* This function adds the current user account to the restricted
|
||||||
* which gets attached to the restricted token used when we create
|
* token used when we create a restricted process.
|
||||||
* a restricted process.
|
|
||||||
*
|
*
|
||||||
* This is required because of some security changes in Windows
|
* This is required because of some security changes in Windows
|
||||||
* that appeared in patches to XP/2K3 and in Vista/2008.
|
* that appeared in patches to XP/2K3 and in Vista/2008.
|
||||||
@ -666,13 +665,13 @@ set_pglocale_pgservice(const char *argv0, const char *app)
|
|||||||
* and CreateProcess() calls when running as Administrator.
|
* and CreateProcess() calls when running as Administrator.
|
||||||
*
|
*
|
||||||
* This function fixes this problem by modifying the DACL of the
|
* This function fixes this problem by modifying the DACL of the
|
||||||
* specified process and explicitly re-adding the current user account.
|
* token the process will use, and explicitly re-adding the current
|
||||||
* This is still secure because the Administrator account inherits it's
|
* user account. This is still secure because the Administrator account
|
||||||
* privileges from the Administrators group - it doesn't have any of
|
* inherits its privileges from the Administrators group - it doesn't
|
||||||
* it's own.
|
* have any of its own.
|
||||||
*/
|
*/
|
||||||
BOOL
|
BOOL
|
||||||
AddUserToDacl(HANDLE hProcess)
|
AddUserToTokenDacl(HANDLE hToken)
|
||||||
{
|
{
|
||||||
int i;
|
int i;
|
||||||
ACL_SIZE_INFORMATION asi;
|
ACL_SIZE_INFORMATION asi;
|
||||||
@ -681,7 +680,6 @@ AddUserToDacl(HANDLE hProcess)
|
|||||||
DWORD dwSize = 0;
|
DWORD dwSize = 0;
|
||||||
DWORD dwTokenInfoLength = 0;
|
DWORD dwTokenInfoLength = 0;
|
||||||
DWORD dwResult = 0;
|
DWORD dwResult = 0;
|
||||||
HANDLE hToken = NULL;
|
|
||||||
PACL pacl = NULL;
|
PACL pacl = NULL;
|
||||||
PSID psidUser = NULL;
|
PSID psidUser = NULL;
|
||||||
TOKEN_DEFAULT_DACL tddNew;
|
TOKEN_DEFAULT_DACL tddNew;
|
||||||
@ -689,13 +687,6 @@ AddUserToDacl(HANDLE hProcess)
|
|||||||
TOKEN_INFORMATION_CLASS tic = TokenDefaultDacl;
|
TOKEN_INFORMATION_CLASS tic = TokenDefaultDacl;
|
||||||
BOOL ret = FALSE;
|
BOOL ret = FALSE;
|
||||||
|
|
||||||
/* Get the token for the process */
|
|
||||||
if (!OpenProcessToken(hProcess, TOKEN_QUERY | TOKEN_ADJUST_DEFAULT, &hToken))
|
|
||||||
{
|
|
||||||
log_error("could not open process token: %ui", GetLastError());
|
|
||||||
goto cleanup;
|
|
||||||
}
|
|
||||||
|
|
||||||
/* Figure out the buffer size for the DACL info */
|
/* Figure out the buffer size for the DACL info */
|
||||||
if (!GetTokenInformation(hToken, tic, (LPVOID) NULL, dwTokenInfoLength, &dwSize))
|
if (!GetTokenInformation(hToken, tic, (LPVOID) NULL, dwTokenInfoLength, &dwSize))
|
||||||
{
|
{
|
||||||
@ -771,7 +762,7 @@ AddUserToDacl(HANDLE hProcess)
|
|||||||
}
|
}
|
||||||
|
|
||||||
/* Add the new ACE for the current user */
|
/* Add the new ACE for the current user */
|
||||||
if (!AddAccessAllowedAce(pacl, ACL_REVISION, GENERIC_ALL, psidUser))
|
if (!AddAccessAllowedAceEx(pacl, ACL_REVISION, OBJECT_INHERIT_ACE, GENERIC_ALL, psidUser))
|
||||||
{
|
{
|
||||||
log_error("could not add access allowed ACE: %ui", GetLastError());
|
log_error("could not add access allowed ACE: %ui", GetLastError());
|
||||||
goto cleanup;
|
goto cleanup;
|
||||||
@ -798,9 +789,6 @@ cleanup:
|
|||||||
if (ptdd)
|
if (ptdd)
|
||||||
LocalFree((HLOCAL) ptdd);
|
LocalFree((HLOCAL) ptdd);
|
||||||
|
|
||||||
if (hToken)
|
|
||||||
CloseHandle(hToken);
|
|
||||||
|
|
||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
Reference in New Issue
Block a user