The LDAP problem has been fixed, but the new sshd-session wants to exec sshd-auth with stdin/out the network socket so the hijack code tries to dup(128, 0) and fails in: if (fd_isrump(oldd)) { int (*op_close)(int) = GETSYSCALL(host, CLOSE); /* only allow fd 0-2 for cross-kernel dup */ if (!(newd >= 0 && newd <= 2 && !fd_isrump(newd))) { errno = EBADF; <----- return -1; } The server client portion of the test works without rump... christos
Attachment:
signature.asc
Description: Message signed with OpenPGP