|
|
5fd2c0 |
commit 2a6b8307fa4243a7921270aedf8ce6506e31569a
|
|
|
5fd2c0 |
Author: Steve Dickson <steved@redhat.com>
|
|
|
5fd2c0 |
Date: Tue Jul 17 15:09:37 2018 -0400
|
|
|
5fd2c0 |
|
|
|
5fd2c0 |
rpc.gssd: truncates 32-bit UIDs/GIDs to 16 bits architectures.
|
|
|
5fd2c0 |
|
|
|
5fd2c0 |
utils/gssd_proc.c uses SYS_setresuid and SYS_setresgid in
|
|
|
5fd2c0 |
change_identity when it should use SYS_setresuid32 and
|
|
|
5fd2c0 |
SYS_setresgid32 instead. This causes it to truncate
|
|
|
5fd2c0 |
UIDs/GIDs > 65536.
|
|
|
5fd2c0 |
|
|
|
5fd2c0 |
Fixes: https://bugs.launchpad.net/ubuntu/+source/nfs-utils/+bug/1779962
|
|
|
5fd2c0 |
Fixes: https://bugzilla.redhat.com/show_bug.cgi?id=1595927
|
|
|
5fd2c0 |
|
|
|
5fd2c0 |
Tested-by: James Ettle <theholyettlz@googlemail.com>
|
|
|
5fd2c0 |
Tested-by: Sree <Sree@gmail.com>
|
|
|
5fd2c0 |
Signed-off-by: Steve Dickson <steved@redhat.com>
|
|
|
5fd2c0 |
|
|
|
5fd2c0 |
diff --git a/utils/gssd/gssd_proc.c b/utils/gssd/gssd_proc.c
|
|
|
5fd2c0 |
index 8767e26..7a57c4e 100644
|
|
|
5fd2c0 |
--- a/utils/gssd/gssd_proc.c
|
|
|
5fd2c0 |
+++ b/utils/gssd/gssd_proc.c
|
|
|
5fd2c0 |
@@ -434,6 +434,7 @@ static int
|
|
|
5fd2c0 |
change_identity(uid_t uid)
|
|
|
5fd2c0 |
{
|
|
|
5fd2c0 |
struct passwd *pw;
|
|
|
5fd2c0 |
+ int res;
|
|
|
5fd2c0 |
|
|
|
5fd2c0 |
/* drop list of supplimentary groups first */
|
|
|
5fd2c0 |
if (syscall(SYS_setgroups, 0, 0) != 0) {
|
|
|
5fd2c0 |
@@ -459,14 +460,23 @@ change_identity(uid_t uid)
|
|
|
5fd2c0 |
* send a signal to all other threads to synchronize the uid in all
|
|
|
5fd2c0 |
* other threads. To bypass this, we have to call syscall() directly.
|
|
|
5fd2c0 |
*/
|
|
|
5fd2c0 |
- if (syscall(SYS_setresgid, pw->pw_gid, pw->pw_gid, pw->pw_gid) != 0) {
|
|
|
5fd2c0 |
+#ifdef __NR_setresuid32
|
|
|
5fd2c0 |
+ res = syscall(SYS_setresgid32, pw->pw_gid, pw->pw_gid, pw->pw_gid);
|
|
|
5fd2c0 |
+#else
|
|
|
5fd2c0 |
+ res = syscall(SYS_setresgid, pw->pw_gid, pw->pw_gid, pw->pw_gid);
|
|
|
5fd2c0 |
+#endif
|
|
|
5fd2c0 |
+ if (res != 0) {
|
|
|
5fd2c0 |
printerr(0, "WARNING: failed to set gid to %u!\n", pw->pw_gid);
|
|
|
5fd2c0 |
return errno;
|
|
|
5fd2c0 |
}
|
|
|
5fd2c0 |
|
|
|
5fd2c0 |
- if (syscall(SYS_setresuid, uid, uid, uid) != 0) {
|
|
|
5fd2c0 |
- printerr(0, "WARNING: Failed to setuid for user with uid %u\n",
|
|
|
5fd2c0 |
- uid);
|
|
|
5fd2c0 |
+#ifdef __NR_setresuid32
|
|
|
5fd2c0 |
+ res = syscall(SYS_setresuid32, uid, uid, uid);
|
|
|
5fd2c0 |
+#else
|
|
|
5fd2c0 |
+ res = syscall(SYS_setresuid, uid, uid, uid);
|
|
|
5fd2c0 |
+#endif
|
|
|
5fd2c0 |
+ if (res != 0) {
|
|
|
5fd2c0 |
+ printerr(0, "WARNING: Failed to setuid for user with uid %u\n", uid);
|
|
|
5fd2c0 |
return errno;
|
|
|
5fd2c0 |
}
|
|
|
5fd2c0 |
|