Stay setuid until just before executing the command.
Fixes a problem with pam_xauth which checks effective and real uids to get the real identity of the user.
This commit is contained in:
@@ -297,9 +297,6 @@ main(int argc, char *argv[], char *envp[])
|
|||||||
SET(command_details.flags, CD_LOGIN_SHELL);
|
SET(command_details.flags, CD_LOGIN_SHELL);
|
||||||
if (ISSET(sudo_mode, MODE_BACKGROUND))
|
if (ISSET(sudo_mode, MODE_BACKGROUND))
|
||||||
SET(command_details.flags, CD_BACKGROUND);
|
SET(command_details.flags, CD_BACKGROUND);
|
||||||
/* Become full root (not just setuid) so user cannot kill us. */
|
|
||||||
if (setuid(ROOT_UID) == -1)
|
|
||||||
sudo_warn("setuid(%d)", ROOT_UID);
|
|
||||||
if (ISSET(command_details.flags, CD_SUDOEDIT)) {
|
if (ISSET(command_details.flags, CD_SUDOEDIT)) {
|
||||||
status = sudo_edit(&command_details);
|
status = sudo_edit(&command_details);
|
||||||
} else {
|
} else {
|
||||||
|
Reference in New Issue
Block a user