diff options
-rw-r--r-- | ChangeLog | 3 | ||||
-rw-r--r-- | session.c | 6 |
2 files changed, 5 insertions, 4 deletions
@@ -50,6 +50,9 @@ | |||
50 | [packet.c] | 50 | [packet.c] |
51 | quiet disconnect notifications on the server from error() back to logit() | 51 | quiet disconnect notifications on the server from error() back to logit() |
52 | if it is a normal client closure; bz#2057 ok+feedback dtucker@ | 52 | if it is a normal client closure; bz#2057 ok+feedback dtucker@ |
53 | - dtucker@cvs.openbsd.org 2013/04/17 09:04:09 | ||
54 | [session.c] | ||
55 | revert rev 1.262; it fails because uid is already set here. ok djm@ | ||
53 | 56 | ||
54 | 20130418 | 57 | 20130418 |
55 | - (djm) [config.guess config.sub] Update to last versions before they switch | 58 | - (djm) [config.guess config.sub] Update to last versions before they switch |
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: session.c,v 1.262 2013/03/06 23:35:23 djm Exp $ */ | 1 | /* $OpenBSD: session.c,v 1.263 2013/04/17 09:04:09 dtucker Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland | 3 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland |
4 | * All rights reserved | 4 | * All rights reserved |
@@ -1529,9 +1529,7 @@ do_setusercontext(struct passwd *pw) | |||
1529 | /* Permanently switch to the desired uid. */ | 1529 | /* Permanently switch to the desired uid. */ |
1530 | permanently_set_uid(pw); | 1530 | permanently_set_uid(pw); |
1531 | #endif | 1531 | #endif |
1532 | } else if (options.chroot_directory != NULL && | 1532 | } |
1533 | strcasecmp(options.chroot_directory, "none") != 0) | ||
1534 | fatal("server lacks privileges to chroot to ChrootDirectory"); | ||
1535 | 1533 | ||
1536 | if (getuid() != pw->pw_uid || geteuid() != pw->pw_uid) | 1534 | if (getuid() != pw->pw_uid || geteuid() != pw->pw_uid) |
1537 | fatal("Failed to set uids to %u.", (u_int) pw->pw_uid); | 1535 | fatal("Failed to set uids to %u.", (u_int) pw->pw_uid); |