diff options
author | Sam Hartman <hartmans@debian.org> | 2024-02-02 11:38:09 -0700 |
---|---|---|
committer | Sam Hartman <hartmans@debian.org> | 2024-04-08 16:35:07 -0600 |
commit | 49382f520dbb742e2b1a497cd307abdf28573b43 (patch) | |
tree | fb86e5b5c5421e77bc869d2b8da7e1507b8fede4 /modules/pam_xauth/tst-pam_xauth | |
parent | 8c3a442761ff9cfe8d4fa3f9bae88588e3876ec1 (diff) |
From: Matthias Gerstner <matthias.gerstner@suse.de> Date: Wed, 27 Dec 2023 14:01:59 +0100 Subject: pam_namespace: protect_dir(): use O_DIRECTORY to prevent local DoS situations Origin: https://github.com/linux-pam/linux-pam/commit/031bb5a5d0d950253b68138b498dc93be69a64cb Bug-Debian: https://bugs.debian.org/1061097 Bug-Debian-Security: https://security-tracker.debian.org/tracker/CVE-2024-22365
Without O_DIRECTORY the path crawling logic is subject to e.g. FIFOs
being placed in user controlled directories, causing the PAM module to
block indefinitely during `openat()`.
Pass O_DIRECTORY to cause the `openat()` to fail if the path does not
refer to a directory.
With this the check whether the final path element is a directory
becomes unnecessary, drop it.
Gbp-Pq: Name pam_namespace_o_directory
Diffstat (limited to 'modules/pam_xauth/tst-pam_xauth')
0 files changed, 0 insertions, 0 deletions