summaryrefslogtreecommitdiff
path: root/session.c
diff options
context:
space:
mode:
authordjm@openbsd.org <djm@openbsd.org>2019-02-22 03:37:11 +0000
committerDamien Miller <djm@mindrot.org>2019-02-22 14:38:38 +1100
commit625b62634c33eaef4b80d07529954fe5c6435fe5 (patch)
treed56d73250825d4a23061a8fb8b01d1201a13df75 /session.c
parentd9ecfaba0b2f1887d20e4368230632e709ca83be (diff)
upstream: perform removal of agent-forwarding directory in forward
setup error path with user's privileged. This is a no-op as this code always runs with user privilege now that we no longer support running sshd with privilege separation disabled, but as long as the privsep skeleton is there we should follow the rules. MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit bz#2969 with patch from Erik Sjölund OpenBSD-Commit-ID: 2b708401a5a8d6133c865d7698d9852210dca846
Diffstat (limited to 'session.c')
-rw-r--r--session.c4
1 files changed, 3 insertions, 1 deletions
diff --git a/session.c b/session.c
index 96167548a..48cfaafbf 100644
--- a/session.c
+++ b/session.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: session.c,v 1.314 2019/02/10 11:10:57 djm Exp $ */ 1/* $OpenBSD: session.c,v 1.315 2019/02/22 03:37:11 djm Exp $ */
2/* 2/*
3 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland 3 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
4 * All rights reserved 4 * All rights reserved
@@ -233,7 +233,9 @@ auth_input_request_forwarding(struct ssh *ssh, struct passwd * pw)
233 authsock_err: 233 authsock_err:
234 free(auth_sock_name); 234 free(auth_sock_name);
235 if (auth_sock_dir != NULL) { 235 if (auth_sock_dir != NULL) {
236 temporarily_use_uid(pw);
236 rmdir(auth_sock_dir); 237 rmdir(auth_sock_dir);
238 restore_uid();
237 free(auth_sock_dir); 239 free(auth_sock_dir);
238 } 240 }
239 if (sock != -1) 241 if (sock != -1)