bmh10 / rpms / openssh

Forked from rpms/openssh 11 days ago
Clone

Blame SOURCES/openssh-7.4p1-authorized_keys_command.patch

8f2528
From ddd3d34e5c7979ca6f4a3a98a7d219a4ed3d98c2 Mon Sep 17 00:00:00 2001
8f2528
From: "djm@openbsd.org" <djm@openbsd.org>
8f2528
Date: Fri, 30 Dec 2016 22:08:02 +0000
8f2528
Subject: [PATCH] upstream commit
8f2528
8f2528
fix deadlock when keys/principals command produces a lot of
8f2528
output and a key is matched early; bz#2655, patch from jboning AT gmail.com
8f2528
8f2528
Upstream-ID: e19456429bf99087ea994432c16d00a642060afe
8f2528
---
8f2528
 auth2-pubkey.c | 8 +++++++-
8f2528
 1 file changed, 7 insertions(+), 1 deletion(-)
8f2528
8f2528
diff --git a/auth2-pubkey.c b/auth2-pubkey.c
8f2528
index 20f3309e1..70c021589 100644
8f2528
--- a/auth2-pubkey.c
8f2528
+++ b/auth2-pubkey.c
8f2528
@@ -727,6 +727,9 @@ match_principals_command(struct passwd *user_pw, const struct sshkey *key)
8f2528
 
8f2528
 	ok = process_principals(f, NULL, pw, cert);
8f2528
 
8f2528
+	fclose(f);
8f2528
+	f = NULL;
8f2528
+
8f2528
 	if (exited_cleanly(pid, "AuthorizedPrincipalsCommand", command) != 0)
8f2528
 		goto out;
8f2528
 
8f2528
@@ -1050,6 +1053,9 @@ user_key_command_allowed2(struct passwd *user_pw, Key *key)
8f2528
 
8f2528
 	ok = check_authkeys_file(f, options.authorized_keys_command, key, pw);
8f2528
 
8f2528
+	fclose(f);
8f2528
+	f = NULL;
8f2528
+
8f2528
 	if (exited_cleanly(pid, "AuthorizedKeysCommand", command) != 0)
8f2528
 		goto out;
8f2528
 
8f2528