Bugzilla – Attachment 1736 Details for
Bug 1678
Insufficient privileges to chroot() on AIX
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
patch for setpcred with chroot
patch.txt (text/plain), 1.11 KB, created by
Cristi Terpea
on 2009-12-01 18:42:20 AEDT
(
hide
)
Description:
patch for setpcred with chroot
Filename:
MIME Type:
Creator:
Cristi Terpea
Created:
2009-12-01 18:42:20 AEDT
Size:
1.11 KB
patch
obsolete
>--- session.c 2009-08-20 07:20:50.000000000 +0100 >+++ session_new.c 2009-11-20 12:07:01.572478232 +0000 >@@ -1521,6 +1521,11 @@ do_setusercontext(struct passwd *pw) > } > # endif /* USE_LIBIAF */ > #endif >+#ifdef HAVE_SETPCRED >+ char *creds[] = { "REAL_USER=root", NULL }; >+ if (setpcred(pw->pw_name, options.chroot_directory == NULL ? (char **)NULL : creds) == -1) >+ fatal("Failed to set process credentials"); >+#endif /* HAVE_SETPCRED */ > > if (options.chroot_directory != NULL && > strcasecmp(options.chroot_directory, "none") != 0) { >@@ -1533,10 +1538,6 @@ do_setusercontext(struct passwd *pw) > free(chroot_path); > } > >-#ifdef HAVE_SETPCRED >- if (setpcred(pw->pw_name, (char **)NULL) == -1) >- fatal("Failed to set process credentials"); >-#endif /* HAVE_SETPCRED */ > #ifdef HAVE_LOGIN_CAP > if (setusercontext(lc, pw, pw->pw_uid, LOGIN_SETUSER) < 0) { > perror("unable to set user context (setuser)");
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1678
:
1735
| 1736