--- paxtest-0.9.11.orig/README +++ paxtest-0.9.11/README @@ -50,7 +50,7 @@ ./paxtest blackhat (to run paxtest in blackhat mode) -This will create a file paxtest.log in the current directory. +This will create a file paxtest.log in the user's home directory. Kiddie and blackhat mode: --- paxtest-0.9.11.orig/debian/changelog +++ paxtest-0.9.11/debian/changelog @@ -1,10 +1,88 @@ +paxtest (1:0.9.11-2) unstable; urgency=low + + * New upstream release, uploaded to Debian. (Closes: #665800) + - The upstream fixed the FTBFS error reported - "fix build with ld + --as-needed". Makefile.psm now places libraries behind the objects + needing their symbols on the commandline when building with ld + --as-needed (initially reported with patch by Julian Taylor + ) (LP: #831405) (Closes: #639128) + * debian/control: + - Add, as to the list of architectures the following: amd64 sparc powerpc + (as they seem to be supported in the source). + - Put full maintainer's name in UTF-8 + * debian/changelog: + - Add changelog of Ubuntu entry + - Add dates to upstream releases based on timestamps of files at + http://grsecurity.net/~spender/ + * debian/sample.debian, debian/rules: + - Add an output example when running in a Debian system (a kernel that + does not include the grsecurity patch) + + -- Javier Fernández-Sanguino Peña Mon, 04 Nov 2013 19:31:08 +0100 + paxtest (0.9.11-1) stable; urgency=low * Added display of exhaustion tests + -- Brad Spengler Thu, 31 Jan 2013 23:21:00 +0200 + paxtest (0.9.10-1) stable; urgency=low * Fixed compilation problem reported on forums * Added display of argv/env randomization + -- Brad Spengler Thu, 29 Dec 2012 19:42:00 +0200 + +paxtest (1:0.9.9-1ubuntu1) oneiric; urgency=low + + * Fix FTBFS with ld --as-needed. LP: #831405. + + -- Matthias Klose "> + jfs@debian.org"> PAXTEST"> @@ -46,7 +46,7 @@ &dhpackage; - + kiddie|blackhat logfile @@ -119,8 +119,10 @@ OPTIONS - This program takes only a single option: a file to which - log all the test results (by default it will log to stdin/stdout) + This program can take two options: the tests to run, which + are indicated using either kiddie or blackhat + and (optionally) a file to which log all the test results. By default it + will log to the user's HOME directory in a paxtest.log file. @@ -163,5 +165,3 @@ sgml-local-ecat-files:nil End: --> - - --- paxtest-0.9.11.orig/debian/rules +++ paxtest-0.9.11/debian/rules @@ -6,7 +6,7 @@ #export DH_VERBOSE=1 # This is the debhelper compatibility version to use. -export DH_COMPAT=3 +#export DH_COMPAT=4 # # The directory where the test programs and shared library are going to live @@ -27,22 +27,25 @@ INSTALL_PROGRAM += -s endif -configure: configure-stamp -configure-stamp: - dh_testdir - # Add here commands to configure the package. - - touch configure-stamp - +#configure: configure-stamp +#configure-stamp: +# dh_testdir +# touch configure-stamp build: build-stamp -build-stamp: configure-stamp +build-stamp: dh_testdir - - # Add here commands to compile the package. - $(MAKE) -f Makefile.Adamantix - #/usr/bin/docbook-to-man debian/paxtest.sgml > paxtest.1 +ifeq ($(DEB_BUILD_ARCH), i386) + $(MAKE) -f Makefile linux32 +else +ifeq ($(DEB_BUILD_ARCH), amd64) + $(MAKE) -f Makefile linux64 +else + $(MAKE) -f Makefile linux +endif +endif + /usr/bin/docbook-to-man debian/paxtest.sgml > paxtest.1 touch build-stamp @@ -50,9 +53,8 @@ dh_testdir dh_testroot rm -f build-stamp configure-stamp - - # Add here commands to clean up after the build process. - -$(MAKE) -f Makefile.Adamantix clean + -$(MAKE) -f Makefile.psm clean + -rm -f paxtest.1 dh_clean @@ -61,9 +63,7 @@ dh_testroot dh_clean -k dh_installdirs - - # Add here commands to install the package into debian/paxtest. - $(MAKE) -f Makefile.Adamantix install DESTDIR=$(CURDIR)/debian/paxtest + $(MAKE) -f Makefile.psm install DESTDIR=$(CURDIR)/debian/paxtest # Build architecture-independent files here. @@ -74,27 +74,16 @@ binary-arch: build install dh_testdir dh_testroot -# dh_installdebconf dh_installdocs - dh_installexamples + dh_installexamples debian/sample.adamantix debian/sample.debian dh_installmenu -# dh_installlogrotate -# dh_installemacsen -# dh_installpam -# dh_installmime -# dh_installinit - dh_installcron - dh_installman - dh_installinfo -# dh_undocumented + dh_installman paxtest.1 dh_installchangelogs dh_link dh_strip dh_compress dh_fixperms -# dh_makeshlibs dh_installdeb -# dh_perl dh_shlibdeps dh_gencontrol dh_md5sums --- paxtest-0.9.11.orig/debian/sample.adamantix +++ paxtest-0.9.11/debian/sample.adamantix @@ -0,0 +1,32 @@ +This is what it looks like when you run it on an Adamantix kernel: + +PaXtest - Copyright(c) 2003 by Peter Busser <[EMAIL PROTECTED]> +Released under the GNU Public Licence version 2 or later + +Executable anonymous mapping : Killed +Executable bss : Killed +Executable data : Killed +Executable heap : Killed +Executable stack : Killed +Executable anonymous mapping (mprotect) : Killed +Executable bss (mprotect) : Killed +Executable data (mprotect) : Killed +Executable heap (mprotect) : Killed +Executable shared library bss (mprotect) : Killed +Executable shared library data (mprotect): Killed +Executable stack (mprotect) : Killed +Anonymous mapping randomisation test : 16 bits (guessed) +Heap randomisation test (ET_EXEC) : 13 bits (guessed) +Heap randomisation test (ET_DYN) : 25 bits (guessed) +Main executable randomisation (ET_EXEC) : No randomisation +Main executable randomisation (ET_DYN) : 17 bits (guessed) +Shared library randomisation test : 16 bits (guessed) +Stack randomisation test (SEGMEXEC) : 23 bits (guessed) +Stack randomisation test (PAGEEXEC) : 24 bits (guessed) +Return to function (strcpy) : Vulnerable +Return to function (strcpy, RANDEXEC) : Vulnerable +Return to function (memcpy) : Vulnerable +Return to function (memcpy, RANDEXEC) : Vulnerable +Executable shared library bss : Killed +Executable shared library data : Killed +Writable text segments : Killed --- paxtest-0.9.11.orig/debian/sample.debian +++ paxtest-0.9.11/debian/sample.debian @@ -0,0 +1,44 @@ + + +This is what it paxtest looks like if you run it on a Debian GNU/Linux kernel +without the Grsecurity patch protections: + +---------------------------------------------------------------------- + +PaXtest - Copyright(c) 2003,2004 by Peter Busser <[EMAIL PROTECTED]> +Released under the GNU Public Licence version 2 or later + +Mode: Blackhat +Linux xxxxxxxx 3.10-3-686-pae #1 SMP Debian 3.10.11-1 (2013-09-10) i686 GNU/Linux + +Executable anonymous mapping : Killed +Executable bss : Killed +Executable data : Killed +Executable heap : Killed +Executable stack : Killed +Executable shared library bss : Killed +Executable shared library data : Killed +Executable anonymous mapping (mprotect) : Vulnerable +Executable bss (mprotect) : Vulnerable +Executable data (mprotect) : Vulnerable +Executable heap (mprotect) : Vulnerable +Executable stack (mprotect) : Vulnerable +Executable shared library bss (mprotect) : Vulnerable +Executable shared library data (mprotect): Vulnerable +Writable text segments : Vulnerable +Anonymous mapping randomisation test : 9 bits (guessed) +Heap randomisation test (ET_EXEC) : 14 bits (guessed) +Heap randomisation test (PIE) : 16 bits (guessed) +Main executable randomisation (ET_EXEC) : 10 bits (guessed) +Main executable randomisation (PIE) : 10 bits (guessed) +Shared library randomisation test : 10 bits (guessed) +Stack randomisation test (SEGMEXEC) : 19 bits (guessed) +Stack randomisation test (PAGEEXEC) : 19 bits (guessed) +Arg/env randomisation test (SEGMEXEC) : 11 bits (guessed) +Arg/env randomisation test (PAGEEXEC) : 11 bits (guessed) +Randomization under memory exhaustion @~0: No randomisation +Randomization under memory exhaustion @0 : No randomisation +Return to function (strcpy) : Vulnerable +Return to function (memcpy) : Killed +Return to function (strcpy, PIE) : Vulnerable +Return to function (memcpy, PIE) : Killed --- paxtest-0.9.11.orig/genpaxtest +++ paxtest-0.9.11/genpaxtest @@ -16,23 +16,27 @@ cat << __here__ > paxtest #!/bin/sh -if [ \$# = 1 ] +if [ \$# = 1 -o \$# = 2 ] then if [ "\$1" = "kiddie" ] then PAXTEST_MODE=0 + shift elif [ "\$1" = "blackhat" ] then PAXTEST_MODE=1 + shift else - echo "usage: paxtest [kiddie|blackhat]" + echo "usage: paxtest [kiddie|blackhat] [logfile]" exit 1 fi else - echo "usage: paxtest [kiddie|blackhat]" + echo "usage: paxtest [kiddie|blackhat] [logfile]" exit 1 fi +LOG=\$HOME/paxtest.log +[ -n "\$1" ] && LOG=\$1 export PAXTEST_MODE if [ "\${LD_LIBRARY_PATH}" = "" ] @@ -43,26 +47,33 @@ fi export LD_LIBRARY_PATH -cat <<__end__ | tee paxtest.log +cat <<__end__ | tee \$LOG PaXtest - Copyright(c) 2003,2004 by Peter Busser Released under the GNU Public Licence version 2 or later __end__ -echo "Mode: \$1" >>paxtest.log -uname -a >>paxtest.log -echo >>paxtest.log +echo -n "Mode: " >>\$LOG +if [ "\$PAXTEST_MODE" -eq 0 ] ; then + echo -n "Kiddie" >>\$LOG +fi +if [ "\$PAXTEST_MODE" -eq 1 ] ; then + echo -n "Blackhat" >>\$LOG +fi +echo >>\$LOG +uname -a >>\$LOG +echo >>\$LOG -echo 'Writing output to paxtest.log' +echo "Writing output to \$LOG" echo 'It may take a while for the tests to complete' for i in $* do ${RUNDIR}/\$i -done >>paxtest.log 2>&1 +done >>\$LOG 2>&1 echo "Test results:" -cat paxtest.log +cat \$LOG echo --- paxtest-0.9.11.orig/results/Debian-2007.blackhat +++ paxtest-0.9.11/results/Debian-2007.blackhat @@ -0,0 +1,33 @@ +PaXtest - Copyright(c) 2003,2004 by Peter Busser +Released under the GNU Public Licence version 2 or later + +Mode: blackhat +Linux silicio 2.4.25-1-686 #1 Tue Feb 24 10:55:59 EST 2004 i686 GNU/Linux + +Executable anonymous mapping : Vulnerable +Executable bss : Vulnerable +Executable data : Vulnerable +Executable heap : Vulnerable +Executable stack : Vulnerable +Executable anonymous mapping (mprotect) : Vulnerable +Executable bss (mprotect) : Vulnerable +Executable data (mprotect) : Vulnerable +Executable heap (mprotect) : Vulnerable +Executable shared library bss (mprotect) : Vulnerable +Executable shared library data (mprotect): Vulnerable +Executable stack (mprotect) : Vulnerable +Anonymous mapping randomisation test : No randomisation +Heap randomisation test (ET_EXEC) : No randomisation +Heap randomisation test (ET_DYN) : No randomisation +Main executable randomisation (ET_EXEC) : No randomisation +Main executable randomisation (ET_DYN) : No randomisation +Shared library randomisation test : No randomisation +Stack randomisation test (SEGMEXEC) : No randomisation +Stack randomisation test (PAGEEXEC) : No randomisation +Return to function (strcpy) : Vulnerable +Return to function (strcpy, RANDEXEC) : Vulnerable +Return to function (memcpy) : Vulnerable +Return to function (memcpy, RANDEXEC) : Vulnerable +Executable shared library bss : Vulnerable +Executable shared library data : Vulnerable +Writable text segments : Vulnerable --- paxtest-0.9.11.orig/results/Debian-2007.kiddie +++ paxtest-0.9.11/results/Debian-2007.kiddie @@ -0,0 +1,33 @@ +PaXtest - Copyright(c) 2003,2004 by Peter Busser +Released under the GNU Public Licence version 2 or later + +Mode: kiddie +Linux silicio 2.4.25-1-686 #1 Tue Feb 24 10:55:59 EST 2004 i686 GNU/Linux + +Executable anonymous mapping : Vulnerable +Executable bss : Vulnerable +Executable data : Vulnerable +Executable heap : Vulnerable +Executable stack : Vulnerable +Executable anonymous mapping (mprotect) : Vulnerable +Executable bss (mprotect) : Vulnerable +Executable data (mprotect) : Vulnerable +Executable heap (mprotect) : Vulnerable +Executable shared library bss (mprotect) : Vulnerable +Executable shared library data (mprotect): Vulnerable +Executable stack (mprotect) : Vulnerable +Anonymous mapping randomisation test : No randomisation +Heap randomisation test (ET_EXEC) : No randomisation +Heap randomisation test (ET_DYN) : No randomisation +Main executable randomisation (ET_EXEC) : No randomisation +Main executable randomisation (ET_DYN) : No randomisation +Shared library randomisation test : No randomisation +Stack randomisation test (SEGMEXEC) : No randomisation +Stack randomisation test (PAGEEXEC) : No randomisation +Return to function (strcpy) : Vulnerable +Return to function (strcpy, RANDEXEC) : Vulnerable +Return to function (memcpy) : Vulnerable +Return to function (memcpy, RANDEXEC) : Vulnerable +Executable shared library bss : Vulnerable +Executable shared library data : Vulnerable +Writable text segments : Vulnerable --- paxtest-0.9.11.orig/results/Debian.blackhat +++ paxtest-0.9.11/results/Debian.blackhat @@ -0,0 +1,33 @@ +PaXtest - Copyright(c) 2003,2004 by Peter Busser +Released under the GNU Public Licence version 2 or later + +Mode: +Linux silicio 2.6.32-5-686 #1 SMP Sat Sep 18 02:14:45 UTC 2010 i686 GNU/Linux + +Executable anonymous mapping : Vulnerable +Executable bss : Vulnerable +Executable data : Vulnerable +Executable heap : Vulnerable +Executable stack : Vulnerable +Executable shared library bss : Vulnerable +Executable shared library data : Vulnerable +Executable anonymous mapping (mprotect) : Vulnerable +Executable bss (mprotect) : Vulnerable +Executable data (mprotect) : Vulnerable +Executable heap (mprotect) : Vulnerable +Executable stack (mprotect) : Vulnerable +Executable shared library bss (mprotect) : Vulnerable +Executable shared library data (mprotect): Vulnerable +Writable text segments : Vulnerable +Anonymous mapping randomisation test : 12 bits (guessed) +Heap randomisation test (ET_EXEC) : 13 bits (guessed) +Heap randomisation test (PIE) : 16 bits (guessed) +Main executable randomisation (ET_EXEC) : No randomisation +Main executable randomisation (PIE) : 12 bits (guessed) +Shared library randomisation test : 10 bits (guessed) +Stack randomisation test (SEGMEXEC) : 19 bits (guessed) +Stack randomisation test (PAGEEXEC) : 19 bits (guessed) +Return to function (strcpy) : Vulnerable +Return to function (memcpy) : Vulnerable +Return to function (strcpy, PIE) : Vulnerable +Return to function (memcpy, PIE) : Vulnerable --- paxtest-0.9.11.orig/results/Debian.kiddie +++ paxtest-0.9.11/results/Debian.kiddie @@ -0,0 +1,33 @@ +PaXtest - Copyright(c) 2003,2004 by Peter Busser +Released under the GNU Public Licence version 2 or later + +Mode: +Linux silicio 2.6.32-5-686 #1 SMP Sat Sep 18 02:14:45 UTC 2010 i686 GNU/Linux + +Executable anonymous mapping : Vulnerable +Executable bss : Vulnerable +Executable data : Vulnerable +Executable heap : Vulnerable +Executable stack : Vulnerable +Executable shared library bss : Vulnerable +Executable shared library data : Vulnerable +Executable anonymous mapping (mprotect) : Vulnerable +Executable bss (mprotect) : Vulnerable +Executable data (mprotect) : Vulnerable +Executable heap (mprotect) : Vulnerable +Executable stack (mprotect) : Vulnerable +Executable shared library bss (mprotect) : Vulnerable +Executable shared library data (mprotect): Vulnerable +Writable text segments : Vulnerable +Anonymous mapping randomisation test : 12 bits (guessed) +Heap randomisation test (ET_EXEC) : 14 bits (guessed) +Heap randomisation test (PIE) : 16 bits (guessed) +Main executable randomisation (ET_EXEC) : No randomisation +Main executable randomisation (PIE) : 12 bits (guessed) +Shared library randomisation test : 10 bits (guessed) +Stack randomisation test (SEGMEXEC) : 19 bits (guessed) +Stack randomisation test (PAGEEXEC) : 19 bits (guessed) +Return to function (strcpy) : Vulnerable +Return to function (memcpy) : Vulnerable +Return to function (strcpy, PIE) : Vulnerable +Return to function (memcpy, PIE) : Vulnerable --- paxtest-0.9.11.orig/results/Results.README +++ paxtest-0.9.11/results/Results.README @@ -8,3 +8,6 @@ Gentoo, or so the Gentoo developers say). It includes ET_EXEC randomisation, which also prevents certain return to function attacks. +The Debian results are run in a stock Debian kernel with no stack-protection +features at all (notice there are PaX and exec-shield are available in +separate patch packages for the kernel) --- paxtest-0.9.11.orig/test +++ paxtest-0.9.11/test @@ -0,0 +1,6 @@ +PaXtest - Copyright(c) 2003,2004 by Peter Busser +Released under the GNU Public Licence version 2 or later + +Mode: Kiddie +Linux silicio 2.6.32-5-686 #1 SMP Sat Sep 18 02:14:45 UTC 2010 i686 GNU/Linux +