summaryrefslogtreecommitdiff
path: root/debian/patches/selinux-role.patch
diff options
context:
space:
mode:
Diffstat (limited to 'debian/patches/selinux-role.patch')
-rw-r--r--debian/patches/selinux-role.patch42
1 files changed, 21 insertions, 21 deletions
diff --git a/debian/patches/selinux-role.patch b/debian/patches/selinux-role.patch
index 70364f9d5..b14402199 100644
--- a/debian/patches/selinux-role.patch
+++ b/debian/patches/selinux-role.patch
@@ -92,7 +92,7 @@ Index: b/monitor.c
92=================================================================== 92===================================================================
93--- a/monitor.c 93--- a/monitor.c
94+++ b/monitor.c 94+++ b/monitor.c
95@@ -137,6 +137,7 @@ 95@@ -145,6 +145,7 @@
96 int mm_answer_pwnamallow(int, Buffer *); 96 int mm_answer_pwnamallow(int, Buffer *);
97 int mm_answer_auth2_read_banner(int, Buffer *); 97 int mm_answer_auth2_read_banner(int, Buffer *);
98 int mm_answer_authserv(int, Buffer *); 98 int mm_answer_authserv(int, Buffer *);
@@ -100,7 +100,7 @@ Index: b/monitor.c
100 int mm_answer_authpassword(int, Buffer *); 100 int mm_answer_authpassword(int, Buffer *);
101 int mm_answer_bsdauthquery(int, Buffer *); 101 int mm_answer_bsdauthquery(int, Buffer *);
102 int mm_answer_bsdauthrespond(int, Buffer *); 102 int mm_answer_bsdauthrespond(int, Buffer *);
103@@ -215,6 +216,7 @@ 103@@ -225,6 +226,7 @@
104 {MONITOR_REQ_SIGN, MON_ONCE, mm_answer_sign}, 104 {MONITOR_REQ_SIGN, MON_ONCE, mm_answer_sign},
105 {MONITOR_REQ_PWNAM, MON_ONCE, mm_answer_pwnamallow}, 105 {MONITOR_REQ_PWNAM, MON_ONCE, mm_answer_pwnamallow},
106 {MONITOR_REQ_AUTHSERV, MON_ONCE, mm_answer_authserv}, 106 {MONITOR_REQ_AUTHSERV, MON_ONCE, mm_answer_authserv},
@@ -108,15 +108,15 @@ Index: b/monitor.c
108 {MONITOR_REQ_AUTH2_READ_BANNER, MON_ONCE, mm_answer_auth2_read_banner}, 108 {MONITOR_REQ_AUTH2_READ_BANNER, MON_ONCE, mm_answer_auth2_read_banner},
109 {MONITOR_REQ_AUTHPASSWORD, MON_AUTH, mm_answer_authpassword}, 109 {MONITOR_REQ_AUTHPASSWORD, MON_AUTH, mm_answer_authpassword},
110 #ifdef USE_PAM 110 #ifdef USE_PAM
111@@ -699,6 +701,7 @@ 111@@ -810,6 +812,7 @@
112 else { 112 else {
113 /* Allow service/style information on the auth context */ 113 /* Allow service/style information on the auth context */
114 monitor_permit(mon_dispatch, MONITOR_REQ_AUTHSERV, 1); 114 monitor_permit(mon_dispatch, MONITOR_REQ_AUTHSERV, 1);
115+ monitor_permit(mon_dispatch, MONITOR_REQ_AUTHROLE, 1); 115+ monitor_permit(mon_dispatch, MONITOR_REQ_AUTHROLE, 1);
116 monitor_permit(mon_dispatch, MONITOR_REQ_AUTH2_READ_BANNER, 1); 116 monitor_permit(mon_dispatch, MONITOR_REQ_AUTH2_READ_BANNER, 1);
117 } 117 }
118 118 #ifdef USE_PAM
119@@ -732,14 +735,37 @@ 119@@ -842,14 +845,37 @@
120 120
121 authctxt->service = buffer_get_string(m, NULL); 121 authctxt->service = buffer_get_string(m, NULL);
122 authctxt->style = buffer_get_string(m, NULL); 122 authctxt->style = buffer_get_string(m, NULL);
@@ -156,7 +156,7 @@ Index: b/monitor.c
156 return (0); 156 return (0);
157 } 157 }
158 158
159@@ -1327,7 +1353,7 @@ 159@@ -1437,7 +1463,7 @@
160 res = pty_allocate(&s->ptyfd, &s->ttyfd, s->tty, sizeof(s->tty)); 160 res = pty_allocate(&s->ptyfd, &s->ttyfd, s->tty, sizeof(s->tty));
161 if (res == 0) 161 if (res == 0)
162 goto error; 162 goto error;
@@ -182,7 +182,7 @@ Index: b/monitor_wrap.c
182=================================================================== 182===================================================================
183--- a/monitor_wrap.c 183--- a/monitor_wrap.c
184+++ b/monitor_wrap.c 184+++ b/monitor_wrap.c
185@@ -280,10 +280,10 @@ 185@@ -318,10 +318,10 @@
186 return (banner); 186 return (banner);
187 } 187 }
188 188
@@ -195,7 +195,7 @@ Index: b/monitor_wrap.c
195 { 195 {
196 Buffer m; 196 Buffer m;
197 197
198@@ -292,11 +292,29 @@ 198@@ -330,11 +330,29 @@
199 buffer_init(&m); 199 buffer_init(&m);
200 buffer_put_cstring(&m, service); 200 buffer_put_cstring(&m, service);
201 buffer_put_cstring(&m, style ? style : ""); 201 buffer_put_cstring(&m, style ? style : "");
@@ -229,7 +229,7 @@ Index: b/monitor_wrap.h
229=================================================================== 229===================================================================
230--- a/monitor_wrap.h 230--- a/monitor_wrap.h
231+++ b/monitor_wrap.h 231+++ b/monitor_wrap.h
232@@ -40,7 +40,8 @@ 232@@ -41,7 +41,8 @@
233 int mm_is_monitor(void); 233 int mm_is_monitor(void);
234 DH *mm_choose_dh(int, int, int); 234 DH *mm_choose_dh(int, int, int);
235 int mm_key_sign(Key *, u_char **, u_int *, u_char *, u_int); 235 int mm_key_sign(Key *, u_char **, u_int *, u_char *, u_int);
@@ -256,7 +256,7 @@ Index: b/openbsd-compat/port-linux.c
256 #include "log.h" 256 #include "log.h"
257 #include "xmalloc.h" 257 #include "xmalloc.h"
258 #include "port-linux.h" 258 #include "port-linux.h"
259@@ -54,9 +60,9 @@ 259@@ -58,9 +64,9 @@
260 260
261 /* Return the default security context for the given username */ 261 /* Return the default security context for the given username */
262 static security_context_t 262 static security_context_t
@@ -268,7 +268,7 @@ Index: b/openbsd-compat/port-linux.c
268 char *sename = NULL, *lvl = NULL; 268 char *sename = NULL, *lvl = NULL;
269 int r; 269 int r;
270 270
271@@ -69,9 +75,16 @@ 271@@ -73,9 +79,16 @@
272 #endif 272 #endif
273 273
274 #ifdef HAVE_GET_DEFAULT_CONTEXT_WITH_LEVEL 274 #ifdef HAVE_GET_DEFAULT_CONTEXT_WITH_LEVEL
@@ -287,7 +287,7 @@ Index: b/openbsd-compat/port-linux.c
287 #endif 287 #endif
288 288
289 if (r != 0) { 289 if (r != 0) {
290@@ -102,7 +115,7 @@ 290@@ -106,7 +119,7 @@
291 291
292 /* Set the execution context to the default for the specified user */ 292 /* Set the execution context to the default for the specified user */
293 void 293 void
@@ -296,7 +296,7 @@ Index: b/openbsd-compat/port-linux.c
296 { 296 {
297 security_context_t user_ctx = NULL; 297 security_context_t user_ctx = NULL;
298 298
299@@ -111,7 +124,7 @@ 299@@ -115,7 +128,7 @@
300 300
301 debug3("%s: setting execution context", __func__); 301 debug3("%s: setting execution context", __func__);
302 302
@@ -305,7 +305,7 @@ Index: b/openbsd-compat/port-linux.c
305 if (setexeccon(user_ctx) != 0) { 305 if (setexeccon(user_ctx) != 0) {
306 switch (security_getenforce()) { 306 switch (security_getenforce()) {
307 case -1: 307 case -1:
308@@ -133,7 +146,7 @@ 308@@ -137,7 +150,7 @@
309 309
310 /* Set the TTY context for the specified user */ 310 /* Set the TTY context for the specified user */
311 void 311 void
@@ -314,7 +314,7 @@ Index: b/openbsd-compat/port-linux.c
314 { 314 {
315 security_context_t new_tty_ctx = NULL; 315 security_context_t new_tty_ctx = NULL;
316 security_context_t user_ctx = NULL; 316 security_context_t user_ctx = NULL;
317@@ -144,7 +157,7 @@ 317@@ -148,7 +161,7 @@
318 318
319 debug3("%s: setting TTY context on %s", __func__, tty); 319 debug3("%s: setting TTY context on %s", __func__, tty);
320 320
@@ -377,7 +377,7 @@ Index: b/session.c
377=================================================================== 377===================================================================
378--- a/session.c 378--- a/session.c
379+++ b/session.c 379+++ b/session.c
380@@ -1467,7 +1467,7 @@ 380@@ -1471,7 +1471,7 @@
381 381
382 /* Set login name, uid, gid, and groups. */ 382 /* Set login name, uid, gid, and groups. */
383 void 383 void
@@ -386,7 +386,7 @@ Index: b/session.c
386 { 386 {
387 char *chroot_path, *tmp; 387 char *chroot_path, *tmp;
388 388
389@@ -1495,7 +1495,7 @@ 389@@ -1499,7 +1499,7 @@
390 endgrent(); 390 endgrent();
391 #endif 391 #endif
392 392
@@ -395,7 +395,7 @@ Index: b/session.c
395 395
396 if (options.chroot_directory != NULL && 396 if (options.chroot_directory != NULL &&
397 strcasecmp(options.chroot_directory, "none") != 0) { 397 strcasecmp(options.chroot_directory, "none") != 0) {
398@@ -1618,7 +1618,7 @@ 398@@ -1625,7 +1625,7 @@
399 399
400 /* Force a password change */ 400 /* Force a password change */
401 if (s->authctxt->force_pwchange) { 401 if (s->authctxt->force_pwchange) {
@@ -404,7 +404,7 @@ Index: b/session.c
404 child_close_fds(); 404 child_close_fds();
405 do_pwchange(s); 405 do_pwchange(s);
406 exit(1); 406 exit(1);
407@@ -1645,7 +1645,7 @@ 407@@ -1652,7 +1652,7 @@
408 /* When PAM is enabled we rely on it to do the nologin check */ 408 /* When PAM is enabled we rely on it to do the nologin check */
409 if (!options.use_pam) 409 if (!options.use_pam)
410 do_nologin(pw); 410 do_nologin(pw);
@@ -413,7 +413,7 @@ Index: b/session.c
413 /* 413 /*
414 * PAM session modules in do_setusercontext may have 414 * PAM session modules in do_setusercontext may have
415 * generated messages, so if this in an interactive 415 * generated messages, so if this in an interactive
416@@ -2057,7 +2057,7 @@ 416@@ -2064,7 +2064,7 @@
417 tty_parse_modes(s->ttyfd, &n_bytes); 417 tty_parse_modes(s->ttyfd, &n_bytes);
418 418
419 if (!use_privsep) 419 if (!use_privsep)
@@ -439,7 +439,7 @@ Index: b/sshd.c
439=================================================================== 439===================================================================
440--- a/sshd.c 440--- a/sshd.c
441+++ b/sshd.c 441+++ b/sshd.c
442@@ -707,7 +707,7 @@ 442@@ -730,7 +730,7 @@
443 RAND_seed(rnd, sizeof(rnd)); 443 RAND_seed(rnd, sizeof(rnd));
444 444
445 /* Drop privileges */ 445 /* Drop privileges */