2011-12-27 05:11:19 +01:00
|
|
|
From 33a59a1905feb5d786e9d457f287dd9e81a9f747 Mon Sep 17 00:00:00 2001
|
|
|
|
From: =?UTF-8?q?Cristian=20Rodr=C3=ADguez?= <crrodriguez@opensuse.org>
|
|
|
|
Date: Tue, 27 Dec 2011 00:33:28 -0300
|
|
|
|
Subject: [PATCH] Use O_CLOEXEC where needed
|
|
|
|
|
|
|
|
---
|
|
|
|
src/agent.c | 2 +-
|
|
|
|
src/knownhost.c | 4 ++--
|
|
|
|
src/userauth.c | 2 +-
|
|
|
|
3 files changed, 4 insertions(+), 4 deletions(-)
|
|
|
|
|
2021-12-10 17:14:35 +01:00
|
|
|
Index: libssh2-1.10.0/src/agent.c
|
2013-01-11 15:43:44 +01:00
|
|
|
===================================================================
|
2021-12-10 17:14:35 +01:00
|
|
|
--- libssh2-1.10.0.orig/src/agent.c
|
|
|
|
+++ libssh2-1.10.0/src/agent.c
|
|
|
|
@@ -109,7 +109,7 @@ agent_connect_unix(LIBSSH2_AGENT *agent)
|
2019-06-21 11:50:59 +02:00
|
|
|
"no auth sock variable");
|
|
|
|
}
|
2011-12-01 03:46:12 +01:00
|
|
|
|
|
|
|
- agent->fd = socket(PF_UNIX, SOCK_STREAM, 0);
|
2011-12-27 05:11:19 +01:00
|
|
|
+ agent->fd = socket(PF_UNIX, SOCK_STREAM | SOCK_CLOEXEC, 0);
|
2019-06-21 11:50:59 +02:00
|
|
|
if(agent->fd < 0)
|
2011-12-01 03:46:12 +01:00
|
|
|
return _libssh2_error(agent->session, LIBSSH2_ERROR_BAD_SOCKET,
|
|
|
|
"failed creating socket");
|
2021-12-10 17:14:35 +01:00
|
|
|
Index: libssh2-1.10.0/src/knownhost.c
|
2013-01-11 15:43:44 +01:00
|
|
|
===================================================================
|
2021-12-10 17:14:35 +01:00
|
|
|
--- libssh2-1.10.0.orig/src/knownhost.c
|
|
|
|
+++ libssh2-1.10.0/src/knownhost.c
|
2019-06-21 11:50:59 +02:00
|
|
|
@@ -963,7 +963,7 @@ libssh2_knownhost_readfile(LIBSSH2_KNOWN
|
2011-12-01 03:46:12 +01:00
|
|
|
"Unsupported type of known-host information "
|
|
|
|
"store");
|
|
|
|
|
2019-06-21 11:50:59 +02:00
|
|
|
- file = fopen(filename, FOPEN_READTEXT);
|
|
|
|
+ file = fopen(filename, FOPEN_READTEXT_CLOEXEC);
|
2011-12-01 03:46:12 +01:00
|
|
|
if(file) {
|
|
|
|
while(fgets(buf, sizeof(buf), file)) {
|
2013-01-11 15:43:44 +01:00
|
|
|
if(libssh2_knownhost_readline(hosts, buf, strlen(buf), type)) {
|
2019-06-21 11:50:59 +02:00
|
|
|
@@ -1204,7 +1204,7 @@ libssh2_knownhost_writefile(LIBSSH2_KNOW
|
2011-12-01 03:46:12 +01:00
|
|
|
"Unsupported type of known-host information "
|
|
|
|
"store");
|
|
|
|
|
2019-06-21 11:50:59 +02:00
|
|
|
- file = fopen(filename, FOPEN_WRITETEXT);
|
|
|
|
+ file = fopen(filename, FOPEN_WRITETEXT_CLOEXEC);
|
2011-12-01 03:46:12 +01:00
|
|
|
if(!file)
|
|
|
|
return _libssh2_error(hosts->session, LIBSSH2_ERROR_FILE,
|
|
|
|
"Failed to open file");
|
2021-12-10 17:14:35 +01:00
|
|
|
Index: libssh2-1.10.0/src/userauth.c
|
2013-01-11 15:43:44 +01:00
|
|
|
===================================================================
|
2021-12-10 17:14:35 +01:00
|
|
|
--- libssh2-1.10.0.orig/src/userauth.c
|
|
|
|
+++ libssh2-1.10.0/src/userauth.c
|
2019-06-21 11:50:59 +02:00
|
|
|
@@ -578,7 +578,7 @@ file_read_publickey(LIBSSH2_SESSION * se
|
2011-12-01 03:46:12 +01:00
|
|
|
_libssh2_debug(session, LIBSSH2_TRACE_AUTH, "Loading public key file: %s",
|
|
|
|
pubkeyfile);
|
|
|
|
/* Read Public Key */
|
2019-06-21 11:50:59 +02:00
|
|
|
- fd = fopen(pubkeyfile, FOPEN_READTEXT);
|
|
|
|
+ fd = fopen(pubkeyfile, FOPEN_READTEXT_CLOEXEC);
|
|
|
|
if(!fd) {
|
2011-12-01 03:46:12 +01:00
|
|
|
return _libssh2_error(session, LIBSSH2_ERROR_FILE,
|
|
|
|
"Unable to open public key file");
|
2021-12-10 17:14:35 +01:00
|
|
|
Index: libssh2-1.10.0/src/libssh2_priv.h
|
2019-06-21 11:50:59 +02:00
|
|
|
===================================================================
|
2021-12-10 17:14:35 +01:00
|
|
|
--- libssh2-1.10.0.orig/src/libssh2_priv.h
|
|
|
|
+++ libssh2-1.10.0/src/libssh2_priv.h
|
|
|
|
@@ -1149,6 +1149,8 @@ endings either CRLF or LF so 't' is appr
|
2019-06-21 11:50:59 +02:00
|
|
|
#define FOPEN_READTEXT "r"
|
|
|
|
#define FOPEN_WRITETEXT "w"
|
|
|
|
#define FOPEN_APPENDTEXT "a"
|
|
|
|
+#define FOPEN_READTEXT_CLOEXEC "re"
|
|
|
|
+#define FOPEN_WRITETEXT_CLOEXEC "we"
|
|
|
|
#endif
|
|
|
|
|
2021-12-10 17:14:35 +01:00
|
|
|
#endif /* __LIBSSH2_PRIV_H */
|