diff options
author | Christian Kastner <ckk@kvr.at> | 2020-05-12 10:19:53 +0200 |
---|---|---|
committer | Andrew G. Morgan <morgan@kernel.org> | 2020-05-12 10:19:53 +0200 |
commit | cfa63dc6881d5ff33bf39084df59fe0d1eb4650d (patch) | |
tree | 18014c9773861cf76bfc84560df652201ec301d4 /pam_cap | |
parent | 52fa6a9608eaf1ef3b77dbb535f13018fb54a224 (diff) | |
download | libcap-cfa63dc6881d5ff33bf39084df59fe0d1eb4650d.tar.gz |
pam_cap: Honor PAM_REINITIALIZE_CRED
Daniel Gröber discovered that pam_cap did not handle PAM_REINITIALIZE_CRED,
which eg: sudo passes.
Signed-off-by: Christian Kastner <ckk@kvr.at>
Signed-off-by: Andrew G. Morgan <morgan@kernel.org>
Diffstat (limited to 'pam_cap')
-rw-r--r-- | pam_cap/pam_cap.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/pam_cap/pam_cap.c b/pam_cap/pam_cap.c index addef87..d17c4ff 100644 --- a/pam_cap/pam_cap.c +++ b/pam_cap/pam_cap.c @@ -335,7 +335,7 @@ int pam_sm_setcred(pam_handle_t *pamh, int flags, int retval; struct pam_cap_s pcs; - if (!(flags & PAM_ESTABLISH_CRED)) { + if (!(flags & (PAM_ESTABLISH_CRED | PAM_REINITIALIZE_CRED))) { D(("we don't handle much in the way of credentials")); return PAM_IGNORE; } |