diff options
Diffstat (limited to 'debian/patches/selinux-role.patch')
-rw-r--r-- | debian/patches/selinux-role.patch | 42 |
1 files changed, 21 insertions, 21 deletions
diff --git a/debian/patches/selinux-role.patch b/debian/patches/selinux-role.patch index 70364f9d5..b14402199 100644 --- a/debian/patches/selinux-role.patch +++ b/debian/patches/selinux-role.patch | |||
@@ -92,7 +92,7 @@ Index: b/monitor.c | |||
92 | =================================================================== | 92 | =================================================================== |
93 | --- a/monitor.c | 93 | --- a/monitor.c |
94 | +++ b/monitor.c | 94 | +++ b/monitor.c |
95 | @@ -137,6 +137,7 @@ | 95 | @@ -145,6 +145,7 @@ |
96 | int mm_answer_pwnamallow(int, Buffer *); | 96 | int mm_answer_pwnamallow(int, Buffer *); |
97 | int mm_answer_auth2_read_banner(int, Buffer *); | 97 | int mm_answer_auth2_read_banner(int, Buffer *); |
98 | int mm_answer_authserv(int, Buffer *); | 98 | int mm_answer_authserv(int, Buffer *); |
@@ -100,7 +100,7 @@ Index: b/monitor.c | |||
100 | int mm_answer_authpassword(int, Buffer *); | 100 | int mm_answer_authpassword(int, Buffer *); |
101 | int mm_answer_bsdauthquery(int, Buffer *); | 101 | int mm_answer_bsdauthquery(int, Buffer *); |
102 | int mm_answer_bsdauthrespond(int, Buffer *); | 102 | int mm_answer_bsdauthrespond(int, Buffer *); |
103 | @@ -215,6 +216,7 @@ | 103 | @@ -225,6 +226,7 @@ |
104 | {MONITOR_REQ_SIGN, MON_ONCE, mm_answer_sign}, | 104 | {MONITOR_REQ_SIGN, MON_ONCE, mm_answer_sign}, |
105 | {MONITOR_REQ_PWNAM, MON_ONCE, mm_answer_pwnamallow}, | 105 | {MONITOR_REQ_PWNAM, MON_ONCE, mm_answer_pwnamallow}, |
106 | {MONITOR_REQ_AUTHSERV, MON_ONCE, mm_answer_authserv}, | 106 | {MONITOR_REQ_AUTHSERV, MON_ONCE, mm_answer_authserv}, |
@@ -108,15 +108,15 @@ Index: b/monitor.c | |||
108 | {MONITOR_REQ_AUTH2_READ_BANNER, MON_ONCE, mm_answer_auth2_read_banner}, | 108 | {MONITOR_REQ_AUTH2_READ_BANNER, MON_ONCE, mm_answer_auth2_read_banner}, |
109 | {MONITOR_REQ_AUTHPASSWORD, MON_AUTH, mm_answer_authpassword}, | 109 | {MONITOR_REQ_AUTHPASSWORD, MON_AUTH, mm_answer_authpassword}, |
110 | #ifdef USE_PAM | 110 | #ifdef USE_PAM |
111 | @@ -699,6 +701,7 @@ | 111 | @@ -810,6 +812,7 @@ |
112 | else { | 112 | else { |
113 | /* Allow service/style information on the auth context */ | 113 | /* Allow service/style information on the auth context */ |
114 | monitor_permit(mon_dispatch, MONITOR_REQ_AUTHSERV, 1); | 114 | monitor_permit(mon_dispatch, MONITOR_REQ_AUTHSERV, 1); |
115 | + monitor_permit(mon_dispatch, MONITOR_REQ_AUTHROLE, 1); | 115 | + monitor_permit(mon_dispatch, MONITOR_REQ_AUTHROLE, 1); |
116 | monitor_permit(mon_dispatch, MONITOR_REQ_AUTH2_READ_BANNER, 1); | 116 | monitor_permit(mon_dispatch, MONITOR_REQ_AUTH2_READ_BANNER, 1); |
117 | } | 117 | } |
118 | 118 | #ifdef USE_PAM | |
119 | @@ -732,14 +735,37 @@ | 119 | @@ -842,14 +845,37 @@ |
120 | 120 | ||
121 | authctxt->service = buffer_get_string(m, NULL); | 121 | authctxt->service = buffer_get_string(m, NULL); |
122 | authctxt->style = buffer_get_string(m, NULL); | 122 | authctxt->style = buffer_get_string(m, NULL); |
@@ -156,7 +156,7 @@ Index: b/monitor.c | |||
156 | return (0); | 156 | return (0); |
157 | } | 157 | } |
158 | 158 | ||
159 | @@ -1327,7 +1353,7 @@ | 159 | @@ -1437,7 +1463,7 @@ |
160 | res = pty_allocate(&s->ptyfd, &s->ttyfd, s->tty, sizeof(s->tty)); | 160 | res = pty_allocate(&s->ptyfd, &s->ttyfd, s->tty, sizeof(s->tty)); |
161 | if (res == 0) | 161 | if (res == 0) |
162 | goto error; | 162 | goto error; |
@@ -182,7 +182,7 @@ Index: b/monitor_wrap.c | |||
182 | =================================================================== | 182 | =================================================================== |
183 | --- a/monitor_wrap.c | 183 | --- a/monitor_wrap.c |
184 | +++ b/monitor_wrap.c | 184 | +++ b/monitor_wrap.c |
185 | @@ -280,10 +280,10 @@ | 185 | @@ -318,10 +318,10 @@ |
186 | return (banner); | 186 | return (banner); |
187 | } | 187 | } |
188 | 188 | ||
@@ -195,7 +195,7 @@ Index: b/monitor_wrap.c | |||
195 | { | 195 | { |
196 | Buffer m; | 196 | Buffer m; |
197 | 197 | ||
198 | @@ -292,11 +292,29 @@ | 198 | @@ -330,11 +330,29 @@ |
199 | buffer_init(&m); | 199 | buffer_init(&m); |
200 | buffer_put_cstring(&m, service); | 200 | buffer_put_cstring(&m, service); |
201 | buffer_put_cstring(&m, style ? style : ""); | 201 | buffer_put_cstring(&m, style ? style : ""); |
@@ -229,7 +229,7 @@ Index: b/monitor_wrap.h | |||
229 | =================================================================== | 229 | =================================================================== |
230 | --- a/monitor_wrap.h | 230 | --- a/monitor_wrap.h |
231 | +++ b/monitor_wrap.h | 231 | +++ b/monitor_wrap.h |
232 | @@ -40,7 +40,8 @@ | 232 | @@ -41,7 +41,8 @@ |
233 | int mm_is_monitor(void); | 233 | int mm_is_monitor(void); |
234 | DH *mm_choose_dh(int, int, int); | 234 | DH *mm_choose_dh(int, int, int); |
235 | int mm_key_sign(Key *, u_char **, u_int *, u_char *, u_int); | 235 | int mm_key_sign(Key *, u_char **, u_int *, u_char *, u_int); |
@@ -256,7 +256,7 @@ Index: b/openbsd-compat/port-linux.c | |||
256 | #include "log.h" | 256 | #include "log.h" |
257 | #include "xmalloc.h" | 257 | #include "xmalloc.h" |
258 | #include "port-linux.h" | 258 | #include "port-linux.h" |
259 | @@ -54,9 +60,9 @@ | 259 | @@ -58,9 +64,9 @@ |
260 | 260 | ||
261 | /* Return the default security context for the given username */ | 261 | /* Return the default security context for the given username */ |
262 | static security_context_t | 262 | static security_context_t |
@@ -268,7 +268,7 @@ Index: b/openbsd-compat/port-linux.c | |||
268 | char *sename = NULL, *lvl = NULL; | 268 | char *sename = NULL, *lvl = NULL; |
269 | int r; | 269 | int r; |
270 | 270 | ||
271 | @@ -69,9 +75,16 @@ | 271 | @@ -73,9 +79,16 @@ |
272 | #endif | 272 | #endif |
273 | 273 | ||
274 | #ifdef HAVE_GET_DEFAULT_CONTEXT_WITH_LEVEL | 274 | #ifdef HAVE_GET_DEFAULT_CONTEXT_WITH_LEVEL |
@@ -287,7 +287,7 @@ Index: b/openbsd-compat/port-linux.c | |||
287 | #endif | 287 | #endif |
288 | 288 | ||
289 | if (r != 0) { | 289 | if (r != 0) { |
290 | @@ -102,7 +115,7 @@ | 290 | @@ -106,7 +119,7 @@ |
291 | 291 | ||
292 | /* Set the execution context to the default for the specified user */ | 292 | /* Set the execution context to the default for the specified user */ |
293 | void | 293 | void |
@@ -296,7 +296,7 @@ Index: b/openbsd-compat/port-linux.c | |||
296 | { | 296 | { |
297 | security_context_t user_ctx = NULL; | 297 | security_context_t user_ctx = NULL; |
298 | 298 | ||
299 | @@ -111,7 +124,7 @@ | 299 | @@ -115,7 +128,7 @@ |
300 | 300 | ||
301 | debug3("%s: setting execution context", __func__); | 301 | debug3("%s: setting execution context", __func__); |
302 | 302 | ||
@@ -305,7 +305,7 @@ Index: b/openbsd-compat/port-linux.c | |||
305 | if (setexeccon(user_ctx) != 0) { | 305 | if (setexeccon(user_ctx) != 0) { |
306 | switch (security_getenforce()) { | 306 | switch (security_getenforce()) { |
307 | case -1: | 307 | case -1: |
308 | @@ -133,7 +146,7 @@ | 308 | @@ -137,7 +150,7 @@ |
309 | 309 | ||
310 | /* Set the TTY context for the specified user */ | 310 | /* Set the TTY context for the specified user */ |
311 | void | 311 | void |
@@ -314,7 +314,7 @@ Index: b/openbsd-compat/port-linux.c | |||
314 | { | 314 | { |
315 | security_context_t new_tty_ctx = NULL; | 315 | security_context_t new_tty_ctx = NULL; |
316 | security_context_t user_ctx = NULL; | 316 | security_context_t user_ctx = NULL; |
317 | @@ -144,7 +157,7 @@ | 317 | @@ -148,7 +161,7 @@ |
318 | 318 | ||
319 | debug3("%s: setting TTY context on %s", __func__, tty); | 319 | debug3("%s: setting TTY context on %s", __func__, tty); |
320 | 320 | ||
@@ -377,7 +377,7 @@ Index: b/session.c | |||
377 | =================================================================== | 377 | =================================================================== |
378 | --- a/session.c | 378 | --- a/session.c |
379 | +++ b/session.c | 379 | +++ b/session.c |
380 | @@ -1467,7 +1467,7 @@ | 380 | @@ -1471,7 +1471,7 @@ |
381 | 381 | ||
382 | /* Set login name, uid, gid, and groups. */ | 382 | /* Set login name, uid, gid, and groups. */ |
383 | void | 383 | void |
@@ -386,7 +386,7 @@ Index: b/session.c | |||
386 | { | 386 | { |
387 | char *chroot_path, *tmp; | 387 | char *chroot_path, *tmp; |
388 | 388 | ||
389 | @@ -1495,7 +1495,7 @@ | 389 | @@ -1499,7 +1499,7 @@ |
390 | endgrent(); | 390 | endgrent(); |
391 | #endif | 391 | #endif |
392 | 392 | ||
@@ -395,7 +395,7 @@ Index: b/session.c | |||
395 | 395 | ||
396 | if (options.chroot_directory != NULL && | 396 | if (options.chroot_directory != NULL && |
397 | strcasecmp(options.chroot_directory, "none") != 0) { | 397 | strcasecmp(options.chroot_directory, "none") != 0) { |
398 | @@ -1618,7 +1618,7 @@ | 398 | @@ -1625,7 +1625,7 @@ |
399 | 399 | ||
400 | /* Force a password change */ | 400 | /* Force a password change */ |
401 | if (s->authctxt->force_pwchange) { | 401 | if (s->authctxt->force_pwchange) { |
@@ -404,7 +404,7 @@ Index: b/session.c | |||
404 | child_close_fds(); | 404 | child_close_fds(); |
405 | do_pwchange(s); | 405 | do_pwchange(s); |
406 | exit(1); | 406 | exit(1); |
407 | @@ -1645,7 +1645,7 @@ | 407 | @@ -1652,7 +1652,7 @@ |
408 | /* When PAM is enabled we rely on it to do the nologin check */ | 408 | /* When PAM is enabled we rely on it to do the nologin check */ |
409 | if (!options.use_pam) | 409 | if (!options.use_pam) |
410 | do_nologin(pw); | 410 | do_nologin(pw); |
@@ -413,7 +413,7 @@ Index: b/session.c | |||
413 | /* | 413 | /* |
414 | * PAM session modules in do_setusercontext may have | 414 | * PAM session modules in do_setusercontext may have |
415 | * generated messages, so if this in an interactive | 415 | * generated messages, so if this in an interactive |
416 | @@ -2057,7 +2057,7 @@ | 416 | @@ -2064,7 +2064,7 @@ |
417 | tty_parse_modes(s->ttyfd, &n_bytes); | 417 | tty_parse_modes(s->ttyfd, &n_bytes); |
418 | 418 | ||
419 | if (!use_privsep) | 419 | if (!use_privsep) |
@@ -439,7 +439,7 @@ Index: b/sshd.c | |||
439 | =================================================================== | 439 | =================================================================== |
440 | --- a/sshd.c | 440 | --- a/sshd.c |
441 | +++ b/sshd.c | 441 | +++ b/sshd.c |
442 | @@ -707,7 +707,7 @@ | 442 | @@ -730,7 +730,7 @@ |
443 | RAND_seed(rnd, sizeof(rnd)); | 443 | RAND_seed(rnd, sizeof(rnd)); |
444 | 444 | ||
445 | /* Drop privileges */ | 445 | /* Drop privileges */ |