Bugzilla – Attachment 2134 Details for
Bug 1960
Running sshd in wrong SELinux context causes segmentation fault when a user logs in
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
[patch]
selinux-getctxbyname-null.diff
selinux-getctxbyname-null.diff (text/plain), 963 bytes, created by
Damien Miller
on 2012-02-24 11:32:25 AEDT
(
hide
)
Description:
selinux-getctxbyname-null.diff
Filename:
MIME Type:
Creator:
Damien Miller
Created:
2012-02-24 11:32:25 AEDT
Size:
963 bytes
patch
obsolete
>Index: port-linux.c >=================================================================== >RCS file: /var/cvs/openssh/openbsd-compat/port-linux.c,v >retrieving revision 1.16 >diff -u -p -r1.16 port-linux.c >--- port-linux.c 29 Aug 2011 06:09:57 -0000 1.16 >+++ port-linux.c 24 Feb 2012 00:31:53 -0000 >@@ -60,7 +60,7 @@ ssh_selinux_enabled(void) > static security_context_t > ssh_selinux_getctxbyname(char *pwname) > { >- security_context_t sc; >+ security_context_t sc = NULL; > char *sename = NULL, *lvl = NULL; > int r; > >@@ -86,6 +86,7 @@ ssh_selinux_getctxbyname(char *pwname) > case 0: > error("%s: Failed to get default SELinux security " > "context for %s", __func__, pwname); >+ sc = NULL; > break; > default: > fatal("%s: Failed to get default SELinux security " >@@ -101,7 +102,7 @@ ssh_selinux_getctxbyname(char *pwname) > xfree(lvl); > #endif > >- return (sc); >+ return sc; > } > > /* Set the execution context to the default for the specified user */
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Diff
View Attachment As Raw
Flags:
dtucker
:
ok+
Actions:
View
|
Diff
Attachments on
bug 1960
:
2119
| 2134