Skip Menu |
 

Subject: ksu spuriously fails when exiting shell when ksu-ing to non-root
Sachin Punadikar reports that ksu spuriously fails when exiting the
spawned shell when ksu-ing to a non-root user. This is due to failure
from krb5_seteuid(0) after setuid(target_user).
From: tlyu@mit.edu
Subject: SVN Commit
* src/clients/ksu/main.c (sweep_up): Don't check return value of
krb5_seteuid(0), as it is not harmful for it to fail, and it will
fail after setuid(target_user). Correct error message.

Commit By: tlyu



Revision: 18438
Changed Files:
U trunk/src/clients/ksu/main.c
From: tlyu@mit.edu
Subject: SVN Commit
pull up r18438 from trunk

r18438@cathode-dark-space: tlyu | 2006-08-15 15:27:08 -0400
ticket: 4137

* src/clients/ksu/main.c (sweep_up): Don't check return value of
krb5_seteuid(0), as it is not harmful for it to fail, and it will
fail after setuid(target_user). Correct error message.



Commit By: tlyu



Revision: 18439
Changed Files:
_U branches/krb5-1-5/
U branches/krb5-1-5/src/clients/ksu/main.c
To: rt@krbdev.mit.edu
Subject: Re: [krbdev.mit.edu #4137] ksu spuriously fails when exiting shell when ksu-ing to non-root
From: Tom Yu <tlyu@MIT.EDU>
Date: Tue, 15 Aug 2006 18:52:12 -0400
RT-Send-Cc:
note that this results from an error in the patch for
MITKRB5-SA-2006-001 and revised patches for that advisory will be
posted.