Bugzilla – Attachment 263 Details for
Bug 83
PAM limits applied incorrectly (pam_session being called as non-root)
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
[patch]
Call pam_session after fork, before setusercontext
session.diff (text/plain), 1.04 KB, created by
Damien Miller
on 2003-03-27 22:08:37 AEDT
(
hide
)
Description:
Call pam_session after fork, before setusercontext
Filename:
MIME Type:
Creator:
Damien Miller
Created:
2003-03-27 22:08:37 AEDT
Size:
1.04 KB
patch
obsolete
>Index: session.c >=================================================================== >RCS file: /var/cvs/openssh/session.c,v >retrieving revision 1.232 >diff -u -r1.232 session.c >--- session.c 21 Mar 2003 01:18:09 -0000 1.232 >+++ session.c 27 Mar 2003 11:07:40 -0000 >@@ -456,8 +456,6 @@ > session_proctitle(s); > > #if defined(USE_PAM) >- do_pam_session(s->pw->pw_name, NULL); >- do_pam_setcred(1); > if (is_pam_password_change_required()) > packet_disconnect("Password change required but no " > "TTY available"); >@@ -582,11 +580,6 @@ > ptyfd = s->ptyfd; > ttyfd = s->ttyfd; > >-#if defined(USE_PAM) >- do_pam_session(s->pw->pw_name, s->tty); >- do_pam_setcred(1); >-#endif >- > /* Fork the child. */ > if ((pid = fork()) == 0) { > fatal_remove_all_cleanups(); >@@ -1310,6 +1303,11 @@ > /* login(1) is only called if we execute the login shell */ > if (options.use_login && command != NULL) > options.use_login = 0; >+ >+#ifdef USE_PAM >+ do_pam_session(s->pw->pw_name, s->tty); >+ do_pam_setcred(1); >+#endif > > #ifdef _UNICOS > cray_setup(pw->pw_uid, pw->pw_name, command);
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Diff
View Attachment As Raw
Actions:
View
|
Diff
Attachments on
bug 83
:
247
| 263