diff options
author | djm@openbsd.org <djm@openbsd.org> | 2019-02-22 03:37:11 +0000 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 2019-02-22 14:38:38 +1100 |
commit | 625b62634c33eaef4b80d07529954fe5c6435fe5 (patch) | |
tree | d56d73250825d4a23061a8fb8b01d1201a13df75 /session.c | |
parent | d9ecfaba0b2f1887d20e4368230632e709ca83be (diff) |
upstream: perform removal of agent-forwarding directory in forward
setup error path with user's privileged. This is a no-op as this code always
runs with user privilege now that we no longer support running sshd with
privilege separation disabled, but as long as the privsep skeleton is there
we should follow the rules.
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
bz#2969 with patch from Erik Sjölund
OpenBSD-Commit-ID: 2b708401a5a8d6133c865d7698d9852210dca846
Diffstat (limited to 'session.c')
-rw-r--r-- | session.c | 4 |
1 files changed, 3 insertions, 1 deletions
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: session.c,v 1.314 2019/02/10 11:10:57 djm Exp $ */ | 1 | /* $OpenBSD: session.c,v 1.315 2019/02/22 03:37:11 djm Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland | 3 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland |
4 | * All rights reserved | 4 | * All rights reserved |
@@ -233,7 +233,9 @@ auth_input_request_forwarding(struct ssh *ssh, struct passwd * pw) | |||
233 | authsock_err: | 233 | authsock_err: |
234 | free(auth_sock_name); | 234 | free(auth_sock_name); |
235 | if (auth_sock_dir != NULL) { | 235 | if (auth_sock_dir != NULL) { |
236 | temporarily_use_uid(pw); | ||
236 | rmdir(auth_sock_dir); | 237 | rmdir(auth_sock_dir); |
238 | restore_uid(); | ||
237 | free(auth_sock_dir); | 239 | free(auth_sock_dir); |
238 | } | 240 | } |
239 | if (sock != -1) | 241 | if (sock != -1) |