6ff184c434
- Fix multiple security issues as outlined in bsc#1173749 bsc#1177780 bsc#1177781 bsc#1177782 bsc#1177783 CVE-2020-25650 CVE-2020-25651 CVE-2020-25652 CVE-2020-25653 systemd-login-Avoid-a-crash-on-container.patch vdagentd-Use-bool-for-agent_owns_clipboard-and-clien.patch vdagentd-Automatically-release-agent_data.patch vdagent-connection-Pass-err-to-g_credentials_get_uni.patch vdagentd-Better-check-for-vdagent_connection_get_pee.patch vdagentd-Avoid-calling-chmod.patch Avoids-unchecked-file-transfer-IDs-allocation-and-us.patch Avoids-uncontrolled-active_xfers-allocations.patch Avoids-unlimited-agent-connections.patch Avoids-user-session-hijacking.patch Better-check-for-sessions.patch vdagentd-Limit-number-of-agents-per-session-to-1.patch cleanup-active_xfers-when-the-client-disconnects.patch vdagentd-do-not-allow-to-use-an-already-used-file-xf.patch Add-a-test-for-session_info.patch - Add a check section to run internal tests. Note that by default the added session_info test is not run, as it doesn't work in context of build service OBS-URL: https://build.opensuse.org/request/show/846096 OBS-URL: https://build.opensuse.org/package/show/Virtualization/spice-vdagent?expand=0&rev=41
38 lines
1.2 KiB
Diff
38 lines
1.2 KiB
Diff
From b894975bedb2b9e01385261183db19f7d0642292 Mon Sep 17 00:00:00 2001
|
|
From: Frediano Ziglio <freddy77@gmail.com>
|
|
Date: Tue, 22 Sep 2020 11:45:56 +0100
|
|
Subject: [PATCH] vdagent-connection: Pass "err" to g_credentials_get_unix_pid
|
|
MIME-Version: 1.0
|
|
Content-Type: text/plain; charset=UTF-8
|
|
Content-Transfer-Encoding: 8bit
|
|
|
|
Git-commit: b894975bedb2b9e01385261183db19f7d0642292
|
|
References: bsc#1173749
|
|
|
|
Allows to return detailed information if g_credentials_get_unix_pid
|
|
fails.
|
|
|
|
Signed-off-by: Frediano Ziglio <freddy77@gmail.com>
|
|
Acked-by: Julien Ropé <jrope@redhat.com>
|
|
Signed-off-by: Bruce Rogers <brogers@suse.com>
|
|
---
|
|
src/vdagent-connection.c | 2 +-
|
|
1 file changed, 1 insertion(+), 1 deletion(-)
|
|
|
|
diff --git a/src/vdagent-connection.c b/src/vdagent-connection.c
|
|
index ede784b..ff8b88d 100644
|
|
--- a/src/vdagent-connection.c
|
|
+++ b/src/vdagent-connection.c
|
|
@@ -155,7 +155,7 @@ gint vdagent_connection_get_peer_pid(VDAgentConnection *self,
|
|
sock = g_socket_connection_get_socket(G_SOCKET_CONNECTION(priv->io_stream));
|
|
cred = g_socket_get_credentials(sock, err);
|
|
if (cred) {
|
|
- pid = g_credentials_get_unix_pid(cred, NULL);
|
|
+ pid = g_credentials_get_unix_pid(cred, err);
|
|
g_object_unref(cred);
|
|
}
|
|
|
|
--
|
|
2.29.0
|
|
|