Package: libpam-chroot
Followup-For: Bug #853502
Dear Maintainer,
Attached please find a patch that fixes this bug. It also addresses #754322.
Thanks,
Jason
-- System Information:
Debian Release: buster/sid
APT prefers unstable
APT policy: (500, 'unstable')
Architecture: ia64
Kernel: Linux 3.14-0.bpo.2-mckinley (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8),
LANGUAGE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: sysvinit (via /sbin/init)
--- libpam-chroot-0.9/pam_chroot.c 2018-01-10 14:20:17.0 +
+++ libpam-chroot-0.9-fixed/pam_chroot.c2018-01-10 14:05:39.275066056
+
@@ -187,7 +187,7 @@
char **uptr;
if(NULL == user || NULL == ngrps) { return -1; }
- if(0 > *ngrps || 0 > gid) { return -1; }
+ if(0 > *ngrps) { return -1; }
if(gcount < *ngrps) {
if(NULL != grps) { grps[gcount] = gid; }
@@ -870,7 +870,7 @@
break;
default:
- if(opts.flags * _PAM_OPTS_DEBUG) {
+ if(opts.flags & _PAM_OPTS_DEBUG) {
_pam_log(LOG_NOTICE, "%s: returning failure",
opts.module);
}
err = PAM_SESSION_ERR;