| Summary: | Set FD_CLOEXEC on client socket | ||||||
|---|---|---|---|---|---|---|---|
| Product: | Portable OpenSSH | Reporter: | jchadima | ||||
| Component: | sshd | Assignee: | Assigned to nobody <unassigned-bugs> | ||||
| Status: | CLOSED FIXED | ||||||
| Severity: | normal | CC: | dtucker, t8m | ||||
| Priority: | P2 | ||||||
| Version: | 5.2p1 | ||||||
| Hardware: | Other | ||||||
| OS: | Linux | ||||||
| Bug Depends on: | |||||||
| Bug Blocks: | 1626 | ||||||
| Attachments: |
|
||||||
|
Description
jchadima
2009-09-01 21:09:46 AEST
Created attachment 1690 [details]
Patch solving the problem
Are any descriptors actually leaked and if so under what conditions? There's a:
closefrom(STDERR_FILENO + 1);
in session.c:do_exec() which is called for all login types.
They are leaked to the xauth child when executed on client for example. ok, sounds reasonable, we should probably make it a helper function in misc.c Thanks for the patch, this has been committed and will be in the 5.4 release. With the release of 5.4p1, this bug is now considered closed. |