]> git.pld-linux.org Git - packages/openssh.git/blame - openssh-selinux-pld.patch
- updated to 3.8.1p1
[packages/openssh.git] / openssh-selinux-pld.patch
CommitLineData
424d4b74
AM
1diff -urN openssh-3.7.1p2.org/session.c openssh-3.7.1p2/session.c
2--- openssh-3.7.1p2.org/session.c 2004-01-05 14:23:20.406243719 +0100
3+++ openssh-3.7.1p2/session.c 2004-01-05 14:31:01.863306724 +0100
4@@ -1327,15 +1327,23 @@
5 if (getuid() != pw->pw_uid || geteuid() != pw->pw_uid)
6 fatal("Failed to set uids to %u.", (u_int) pw->pw_uid);
7 #ifdef WITH_SELINUX
c228aa77 8- if (is_selinux_enabled()>0)
424d4b74
AM
9+ if (is_selinux_enabled() > 0)
10 {
11 security_context_t scontext;
12- if (get_default_context(pw->pw_name,NULL,&scontext))
13- fatal("Failed to get default security context for %s.", pw->pw_name);
14- if (setexeccon(scontext)) {
15- fatal("Failed to set exec security context %s for %s.", scontext, pw->pw_name);
16+ if (get_default_context(pw->pw_name,NULL,&scontext)) {
17+ if (security_getenforce())
18+ fatal("Failed to get default security context for %s.", pw->pw_name);
19+ else
20+ error("Failed to get default security context for %s (SELinux in permissive mode, continuing).", pw->pw_name);
21+ } else {
22+ if (setexeccon(scontext)) {
23+ if (security_getenforce())
24+ fatal("Failed to set exec security context %s for %s.", scontext, pw->pw_name);
25+ else
26+ error("Failed to set exec security context %s for %s (SELinux in permissive mode, continuing).", scontext, pw->pw_name);
27+ }
28+ freecon(scontext);
29 }
30- freecon(scontext);
31 }
32 #endif
33 }
34diff -urN openssh-3.7.1p2.org/sshpty.c openssh-3.7.1p2/sshpty.c
35--- openssh-3.7.1p2.org/sshpty.c 2004-01-05 14:23:20.667189473 +0100
36+++ openssh-3.7.1p2/sshpty.c 2004-01-05 14:29:33.403698686 +0100
37@@ -397,8 +397,12 @@
38 security_context_t new_tty_context=NULL,
39 user_context=NULL, old_tty_context=NULL;
40
41- if (get_default_context(pw->pw_name,NULL,&user_context))
42- fatal("Failed to get default security context for %s.", pw->pw_name);
43+ if (get_default_context(pw->pw_name,NULL,&user_context)) {
44+ if (security_getenforce())
45+ fatal("Failed to get default security context for %s.", pw->pw_name);
46+ else
47+ error("Failed to get default security context for %s (SELinux in permissive mode, continuing).", pw->pw_name);
48+ } else {
49
50 if (getfilecon(ttyname, &old_tty_context)<0) {
51 error("getfilecon(%.100s) failed: %.100s", ttyname,
52@@ -421,6 +425,7 @@
53 freecon(old_tty_context);
54 }
55 freecon(user_context);
56+ }
57 }
58 #endif
59 if (stat(ttyname, &st))
This page took 0.092186 seconds and 4 git commands to generate.