| Summary: | sshd privsep monitor process doesn't handle SIGXFSZ signal | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
| Product: | Portable OpenSSH | Reporter: | Petr Lautrbach <plautrba> | ||||||||
| Component: | sshd | Assignee: | Damien Miller <djm> | ||||||||
| Status: | CLOSED FIXED | ||||||||||
| Severity: | normal | CC: | djm | ||||||||
| Priority: | P5 | ||||||||||
| Version: | 6.6p1 | ||||||||||
| Hardware: | All | ||||||||||
| OS: | Linux | ||||||||||
| Bug Depends on: | |||||||||||
| Bug Blocks: | 2226 | ||||||||||
| Attachments: |
|
||||||||||
|
Description
Petr Lautrbach
2014-08-23 00:31:26 AEST
Created attachment 2461 [details]
Ignore SIGXFSZ in preauth monitor
This will be in openssh-6.7 Unfortunatelly, it doesn't fix the issue. lastlog is written in postauth phase so SIGXFSZ has to be ignored there. Created attachment 2462 [details]
Ignore SIGXFSZ in postauth monitor child
Using this patch, the following message is logged in the described scenario:
Aug 26 16:31:14 hulk.w.lan sshd[27852]: lastlog_write_entry: Error writing to /var/log/lastlog: File too large
Reproducer:
- create an user with uid 1280000008
- set openssh to use pam
- set pam to use pam_limit.so
session required pam_limits.so
- add following line to /etc/security/limits.conf
user hard fsize 1024000
- try to login as user
Created attachment 2463 [details]
Ignore SIGXFSZ in postauth monitor child
applied - thanks Close all bugs left open from 6.6 and 6.7 releases. |