Displaying 5 results from an estimated 5 matches for "freecon".
Did you mean:
freecom
2004 Sep 07
0
Please review openssh patch for selinux
...t(newcon, type) != 0) {
+ context_free(newcon);
+ if (security_getenforce() > 0)
+ fatal("Failed to set type %s for %s.", role, name);
+ else
+ error("Failed to set type %s for %s. Continuing in permissive mode", role, name);
+ } else {
+ freecon(user_context);
+ user_context = strdup(context_str(newcon));
+ context_free(newcon);
+ }
+ }
+ }
+ }
+ }
+ return user_context;
+}
+
+void setup_selinux_pty(const char *name, const char *tty) {
+ if (is_selinux_enabled() > 0) {
+ security_context_t new_tty_context=NULL, user...
2011 Dec 13
5
[Bug 1960] New: Running sshd in wrong SELinux context causes segmentation fault when a user logs in
...t_default_context() will result in the return code -1, but
"sc" is left untouched (and thus not a valid security_context_t
instance). Later in the function, "sc" is returned to the calling
function (which is ssh_selinux_setup_exec_context) which tries to free
the context through freecon(user_ctx).
This can be fixed by initializing sc to NULL to begin with (see line
59):
55 /* Return the default security context for the given username */
56 static security_context_t
57 ssh_selinux_getctxbyname(char *pwname)
58 {
59 security_context_t sc = NULL;
60 char *sena...
2011 Mar 31
1
[v1 PATCH 0/1] Review request for a memory leak fix for openssh
----------------------------------------------------
Summary: fix a memory leak for Openssh
----------------------------------------------------
Upstream Project Name: OpenSSH
Upstream Project URL: anoncvs at anoncvs.mindrot.org:/cvs
Applies to: anoncvs at anoncvs.mindrot.org:/cvs
Brief Description: the memory which is allocated by matchpathcon should be freed after it is used
Will Submit to:
2011 Mar 31
0
[v1 PATCH 1/1] Free memory
.../openbsd-compat/port-linux.c
+++ b/openbsd-compat/port-linux.c
@@ -217,8 +217,10 @@ ssh_selinux_setfscreatecon(const char *p
setfscreatecon(NULL);
return;
}
- if (matchpathcon(path, 0700, &context) == 0)
+ if (matchpathcon(path, 0700, &context) == 0) {
setfscreatecon(context);
+ freecon(context);
+ }
}
#endif /* WITH_SELINUX */
2011 May 20
0
[patch] the memory which is allocated by matchpathcon should be freed after it is useless
...nbsd-compat/port-linux.c
+++ b/openbsd-compat/port-linux.c
@@ -217,8 +217,10 @@ ssh_selinux_setfscreatecon(const char *p
setfscreatecon(NULL);
return;
}
- if (matchpathcon(path, 0700, &context) == 0)
+ if (matchpathcon(path, 0700, &context) == 0) {
setfscreatecon(context);
+ freecon(context);
+ }
}
#endif /* WITH_SELINUX */