Ok, here is the patch. Comment inside the patch explains what it does:
diff -ru pam-0.79-3.2/Linux-PAM/modules/pam_limits/pam_limits.c
pam-0.79-3.2.0vh/Linux-PAM/modules/pam_limits/pam_limits.c
--- pam-0.79-3.2/Linux-PAM/modules/pam_limits/pam_limits.c 2006-09-20
13:32:48.000000000 +0300
+++ pam-0.79-3.2.0vh/Linux-PAM/modules/pam_limits/pam_limits.c 2006-09-21
19:48:18.000000000 +0300
@@ -257,8 +257,38 @@
pl->supported[i] = 1;
pl->limits[i].src_soft = LIMITS_DEF_NONE;
pl->limits[i].src_hard = LIMITS_DEF_NONE;
- pl->limits[i].limit.rlim_cur = RLIM_INFINITY;
- pl->limits[i].limit.rlim_max = RLIM_INFINITY;
+ switch (i) {
+ case RLIMIT_CPU:
+ case RLIMIT_FSIZE:
+ case RLIMIT_DATA:
+ case RLIMIT_STACK:
+ case RLIMIT_CORE:
+ case RLIMIT_RSS:
+ case RLIMIT_NPROC:
+ case RLIMIT_NOFILE:
+ case RLIMIT_MEMLOCK:
+#ifdef RLIMIT_AS
+ case RLIMIT_AS:
+#endif
+#ifdef RLIMIT_LOCKS
+ case RLIMIT_LOCKS:
+#endif
+#ifdef RLIMIT_SIGPENDING
+ case RLIMIT_SIGPENDING:
+#endif
+#ifdef RLIMIT_MSGQUEUE
+ case RLIMIT_MSGQUEUE:
+#endif
+ pl->limits[i].limit.rlim_cur = RLIM_INFINITY;
+ pl->limits[i].limit.rlim_max = RLIM_INFINITY;
+ break;
+ default:
+ /* Dont touch unknown/unsupported rlimit values ---
+ * RLIM_INFINITY might be a bad choice for them and
+ * even open up security holes (for example, the latter
+ * is true for RLIM_RTPRIO in newer Linux kernels). */
+ break;
+ }
}
}
--
Ville Hallik
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]