summaryrefslogtreecommitdiff
path: root/libfshelp/exec-reauth.c
AgeCommit message (Collapse)Author
2023-05-10libfshelp: Port to x86_64Sergey Bugaev
Message-Id: <20230508213136.608575-5-bugaevc@gmail.com>
2022-08-10Remove the concept of process ownerSergey Bugaev
Now that it's completely unused. procinfo.owner is now simply set to the first UID that a process has. proc_setowner () is kept for compatibility, but now does nothing. The clients still try to call it, though, for compatibility with older proc server versions.
2022-08-10libshouldbeinlibc: Do not reauthenticate proc port when secureSergey Bugaev
exec_reauth () is supposed to reauthenticate the given ports and file descriptors with a new authentication. If the secure flag is set, this reauthentication is happening for a future exec with the EXEC_SECURE flag. Now that the exec server uses proc_reauthenticate_reassign (), the process reauthentication is done atomically with task reassignment by the exec server. So stop doing it inside exec_reauth (). This fixes a vulnerability where a process was able to use its reauthenticated proc port before it got exec'ed over.
2009-12-13Fix setgid behaviorSamuel Thibault
* libfshelp/exec-reauth.c (fshelp_exec_reauth): Set gid in eff_gids and avail_gids instead of in eff_uids, and avail_uids.
2002-05-282002-05-10 Roland McGrath <roland@frob.com>Roland McGrath
* exec-reauth.c (fshelp_exec_reauth): Always set *SECURE if nonnull, as the comment says we do.
1997-07-09Tue Jul 1 16:45:27 1997 Thomas Bushnell, n/BSG <thomas@gnu.ai.mit.edu>Thomas Bushnell
* exec-reauth.c (fshelp_exec_reauth): If the new set of eff_uids is empty, then still do proc_setowner, but this time to set it to "unowned" status.
1996-05-09(fshelp_exec_reauth): Provide new third arg to proc_setowner.Michael I. Bushnell
1996-01-19(fshelp_exec_reauth): Don't setgid the uids.Miles Bader
1996-01-02Use exec_reauth() instead of doing it ourselves.Miles Bader
1996-01-01Initial revisionMiles Bader