The LDAP problem has been fixed, but the new sshd-session wants to exec sshd-auth with stdin/out the network socket so the hijack
code tries to dup(128, 0) and fails in:
if (fd_isrump(oldd)) {
int (*op_close)(int) = GETSYSCALL(host, CLOSE);
/* only allow fd 0-2 for cross-kernel dup */
if (!(newd >= 0 && newd <= 2 && !fd_isrump(newd))) {
errno = EBADF; <-----
return -1;
}
The server client portion of the test works without rump...
christos
Attachment:
signature.asc
Description: Message signed with OpenPGP