aboutsummaryrefslogtreecommitdiff
path: root/libpam
diff options
context:
space:
mode:
authorTobias Stoeckmann <tobias@stoeckmann.org>2024-01-24 18:57:42 +0100
committerDmitry V. Levin <ldv@strace.io>2024-01-24 21:48:21 +0000
commitb7b96362087414e52524d3d9d9b3faa21e1db620 (patch)
treef9784174d769012b7f193150a37553ec11fd6760 /libpam
parent54a0aee65b3d8129a55ece62ab8540f1cac3e929 (diff)
downloadpam-b7b96362087414e52524d3d9d9b3faa21e1db620.tar.gz
pam-b7b96362087414e52524d3d9d9b3faa21e1db620.tar.bz2
pam-b7b96362087414e52524d3d9d9b3faa21e1db620.zip
pam_unix: try to set uid to 0 for unix_chkpwd
The geteuid check does not cover all cases. If a program runs with elevated capabilities like CAP_SETUID then we can still check credentials of other users. Keep logging for future analysis though. Resolves: https://github.com/linux-pam/linux-pam/issues/747 Fixes: b3020da7da38 ("pam_unix/passverify: always run the helper to obtain shadow password file entries") Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
Diffstat (limited to 'libpam')
0 files changed, 0 insertions, 0 deletions