- properly restore euid in case connect to the ssh-agent socket fails
This commit is contained in:
parent
d2ed53bfc6
commit
bb5eb00d2d
@ -73,7 +73,7 @@
|
|||||||
%define openssh_ver 5.6p1
|
%define openssh_ver 5.6p1
|
||||||
%define openssh_rel 19
|
%define openssh_rel 19
|
||||||
%define pam_ssh_agent_ver 0.9.2
|
%define pam_ssh_agent_ver 0.9.2
|
||||||
%define pam_ssh_agent_rel 28
|
%define pam_ssh_agent_rel 29
|
||||||
|
|
||||||
Summary: An open source implementation of SSH protocol versions 1 and 2
|
Summary: An open source implementation of SSH protocol versions 1 and 2
|
||||||
Name: openssh
|
Name: openssh
|
||||||
@ -591,9 +591,11 @@ fi
|
|||||||
%endif
|
%endif
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Wed Nov 24 2010 Jan F. Chadima <jchadima@redhat.com> - 5.6p1-19 + 0.9.2-29
|
||||||
|
- properly restore euid in case connect to the ssh-agent socket fails
|
||||||
|
|
||||||
* Mon Nov 22 2010 Jan F. Chadima <jchadima@redhat.com> - 5.6p1-19 + 0.9.2-28
|
* Mon Nov 22 2010 Jan F. Chadima <jchadima@redhat.com> - 5.6p1-19 + 0.9.2-28
|
||||||
- striped read permissions from suid and sgid binaries
|
- striped read permissions from suid and sgid binaries
|
||||||
- properly restore euid in case connect to the ssh-agent socket fails
|
|
||||||
|
|
||||||
* Mon Nov 15 2010 Jan F. Chadima <jchadima@redhat.com> - 5.6p1-18 + 0.9.2-27
|
* Mon Nov 15 2010 Jan F. Chadima <jchadima@redhat.com> - 5.6p1-18 + 0.9.2-27
|
||||||
- used upstream version of the biguid patch
|
- used upstream version of the biguid patch
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
diff -up pam_ssh_agent_auth-0.9.2/iterate_ssh_agent_keys.c.seteuid pam_ssh_agent_auth-0.9.2/iterate_ssh_agent_keys.c
|
diff -up pam_ssh_agent_auth-0.9.2/iterate_ssh_agent_keys.c.seteuid pam_ssh_agent_auth-0.9.2/iterate_ssh_agent_keys.c
|
||||||
--- pam_ssh_agent_auth-0.9.2/iterate_ssh_agent_keys.c.seteuid 2010-09-08 08:54:29.000000000 +0200
|
--- pam_ssh_agent_auth-0.9.2/iterate_ssh_agent_keys.c.seteuid 2010-09-08 08:54:29.000000000 +0200
|
||||||
+++ pam_ssh_agent_auth-0.9.2/iterate_ssh_agent_keys.c 2010-11-22 08:38:05.000000000 +0100
|
+++ pam_ssh_agent_auth-0.9.2/iterate_ssh_agent_keys.c 2010-11-22 08:38:05.000000000 +0100
|
||||||
@@ -131,13 +131,17 @@ ssh_get_authentication_socket_for_uid(ui
|
@@ -131,13 +131,18 @@ ssh_get_authentication_socket_for_uid(ui
|
||||||
}
|
}
|
||||||
|
|
||||||
errno = 0;
|
errno = 0;
|
||||||
@ -10,6 +10,7 @@ diff -up pam_ssh_agent_auth-0.9.2/iterate_ssh_agent_keys.c.seteuid pam_ssh_agent
|
|||||||
+ /* To ensure a race condition is not used to circumvent the stat
|
+ /* To ensure a race condition is not used to circumvent the stat
|
||||||
+ above, we will temporarily drop UID to the caller */
|
+ above, we will temporarily drop UID to the caller */
|
||||||
+ if (seteuid(uid) == -1) {
|
+ if (seteuid(uid) == -1) {
|
||||||
|
+ close(sock);
|
||||||
+ error("seteuid(%lu) failed", (unsigned long) uid);
|
+ error("seteuid(%lu) failed", (unsigned long) uid);
|
||||||
+ return -1;
|
+ return -1;
|
||||||
+ }
|
+ }
|
||||||
|
Loading…
Reference in New Issue
Block a user