diff options
author | Colin Watson <cjwatson@debian.org> | 2012-05-18 12:16:05 +0100 |
---|---|---|
committer | Colin Watson <cjwatson@debian.org> | 2012-05-18 12:16:05 +0100 |
commit | dabbdfacc9f6995b0739772a47704186dcf34ea5 (patch) | |
tree | 0a0b306a637bc85eb719261b74884f0b9573ec41 /debian/patches/selinux-role.patch | |
parent | 1e0d51b642cac9a6bfb719e6320905625aa5f943 (diff) | |
parent | dd5ed53e20d218607260916a6b04d1c8c5b3d88f (diff) |
* New upstream release (http://www.openssh.org/txt/release-6.0).
- Fix IPQoS not being set on non-mapped v4-in-v6 addressed connections
(closes: #643312, #650512).
- Add a new privilege separation sandbox implementation for Linux's new
seccomp sandbox, automatically enabled on platforms that support it.
(Note: privilege separation sandboxing is still experimental.)
Diffstat (limited to 'debian/patches/selinux-role.patch')
-rw-r--r-- | debian/patches/selinux-role.patch | 23 |
1 files changed, 10 insertions, 13 deletions
diff --git a/debian/patches/selinux-role.patch b/debian/patches/selinux-role.patch index b14402199..0d696989a 100644 --- a/debian/patches/selinux-role.patch +++ b/debian/patches/selinux-role.patch | |||
@@ -108,7 +108,7 @@ Index: b/monitor.c | |||
108 | {MONITOR_REQ_AUTH2_READ_BANNER, MON_ONCE, mm_answer_auth2_read_banner}, | 108 | {MONITOR_REQ_AUTH2_READ_BANNER, MON_ONCE, mm_answer_auth2_read_banner}, |
109 | {MONITOR_REQ_AUTHPASSWORD, MON_AUTH, mm_answer_authpassword}, | 109 | {MONITOR_REQ_AUTHPASSWORD, MON_AUTH, mm_answer_authpassword}, |
110 | #ifdef USE_PAM | 110 | #ifdef USE_PAM |
111 | @@ -810,6 +812,7 @@ | 111 | @@ -811,6 +813,7 @@ |
112 | else { | 112 | else { |
113 | /* Allow service/style information on the auth context */ | 113 | /* Allow service/style information on the auth context */ |
114 | monitor_permit(mon_dispatch, MONITOR_REQ_AUTHSERV, 1); | 114 | monitor_permit(mon_dispatch, MONITOR_REQ_AUTHSERV, 1); |
@@ -116,7 +116,7 @@ Index: b/monitor.c | |||
116 | monitor_permit(mon_dispatch, MONITOR_REQ_AUTH2_READ_BANNER, 1); | 116 | monitor_permit(mon_dispatch, MONITOR_REQ_AUTH2_READ_BANNER, 1); |
117 | } | 117 | } |
118 | #ifdef USE_PAM | 118 | #ifdef USE_PAM |
119 | @@ -842,14 +845,37 @@ | 119 | @@ -843,14 +846,37 @@ |
120 | 120 | ||
121 | authctxt->service = buffer_get_string(m, NULL); | 121 | authctxt->service = buffer_get_string(m, NULL); |
122 | authctxt->style = buffer_get_string(m, NULL); | 122 | authctxt->style = buffer_get_string(m, NULL); |
@@ -156,7 +156,7 @@ Index: b/monitor.c | |||
156 | return (0); | 156 | return (0); |
157 | } | 157 | } |
158 | 158 | ||
159 | @@ -1437,7 +1463,7 @@ | 159 | @@ -1438,7 +1464,7 @@ |
160 | res = pty_allocate(&s->ptyfd, &s->ttyfd, s->tty, sizeof(s->tty)); | 160 | res = pty_allocate(&s->ptyfd, &s->ttyfd, s->tty, sizeof(s->tty)); |
161 | if (res == 0) | 161 | if (res == 0) |
162 | goto error; | 162 | goto error; |
@@ -256,18 +256,15 @@ Index: b/openbsd-compat/port-linux.c | |||
256 | #include "log.h" | 256 | #include "log.h" |
257 | #include "xmalloc.h" | 257 | #include "xmalloc.h" |
258 | #include "port-linux.h" | 258 | #include "port-linux.h" |
259 | @@ -58,9 +64,9 @@ | 259 | @@ -58,7 +64,7 @@ |
260 | 260 | ||
261 | /* Return the default security context for the given username */ | 261 | /* Return the default security context for the given username */ |
262 | static security_context_t | 262 | static security_context_t |
263 | -ssh_selinux_getctxbyname(char *pwname) | 263 | -ssh_selinux_getctxbyname(char *pwname) |
264 | +ssh_selinux_getctxbyname(char *pwname, const char *role) | 264 | +ssh_selinux_getctxbyname(char *pwname, const char *role) |
265 | { | 265 | { |
266 | - security_context_t sc; | 266 | security_context_t sc = NULL; |
267 | + security_context_t sc = NULL; | ||
268 | char *sename = NULL, *lvl = NULL; | 267 | char *sename = NULL, *lvl = NULL; |
269 | int r; | ||
270 | |||
271 | @@ -73,9 +79,16 @@ | 268 | @@ -73,9 +79,16 @@ |
272 | #endif | 269 | #endif |
273 | 270 | ||
@@ -287,7 +284,7 @@ Index: b/openbsd-compat/port-linux.c | |||
287 | #endif | 284 | #endif |
288 | 285 | ||
289 | if (r != 0) { | 286 | if (r != 0) { |
290 | @@ -106,7 +119,7 @@ | 287 | @@ -107,7 +120,7 @@ |
291 | 288 | ||
292 | /* Set the execution context to the default for the specified user */ | 289 | /* Set the execution context to the default for the specified user */ |
293 | void | 290 | void |
@@ -296,7 +293,7 @@ Index: b/openbsd-compat/port-linux.c | |||
296 | { | 293 | { |
297 | security_context_t user_ctx = NULL; | 294 | security_context_t user_ctx = NULL; |
298 | 295 | ||
299 | @@ -115,7 +128,7 @@ | 296 | @@ -116,7 +129,7 @@ |
300 | 297 | ||
301 | debug3("%s: setting execution context", __func__); | 298 | debug3("%s: setting execution context", __func__); |
302 | 299 | ||
@@ -305,7 +302,7 @@ Index: b/openbsd-compat/port-linux.c | |||
305 | if (setexeccon(user_ctx) != 0) { | 302 | if (setexeccon(user_ctx) != 0) { |
306 | switch (security_getenforce()) { | 303 | switch (security_getenforce()) { |
307 | case -1: | 304 | case -1: |
308 | @@ -137,7 +150,7 @@ | 305 | @@ -138,7 +151,7 @@ |
309 | 306 | ||
310 | /* Set the TTY context for the specified user */ | 307 | /* Set the TTY context for the specified user */ |
311 | void | 308 | void |
@@ -314,7 +311,7 @@ Index: b/openbsd-compat/port-linux.c | |||
314 | { | 311 | { |
315 | security_context_t new_tty_ctx = NULL; | 312 | security_context_t new_tty_ctx = NULL; |
316 | security_context_t user_ctx = NULL; | 313 | security_context_t user_ctx = NULL; |
317 | @@ -148,7 +161,7 @@ | 314 | @@ -149,7 +162,7 @@ |
318 | 315 | ||
319 | debug3("%s: setting TTY context on %s", __func__, tty); | 316 | debug3("%s: setting TTY context on %s", __func__, tty); |
320 | 317 | ||
@@ -439,7 +436,7 @@ Index: b/sshd.c | |||
439 | =================================================================== | 436 | =================================================================== |
440 | --- a/sshd.c | 437 | --- a/sshd.c |
441 | +++ b/sshd.c | 438 | +++ b/sshd.c |
442 | @@ -730,7 +730,7 @@ | 439 | @@ -734,7 +734,7 @@ |
443 | RAND_seed(rnd, sizeof(rnd)); | 440 | RAND_seed(rnd, sizeof(rnd)); |
444 | 441 | ||
445 | /* Drop privileges */ | 442 | /* Drop privileges */ |