Apply openssh sftp-chroot patch to openssh-server
Bug #24777 reported by
Daniel Hahler
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
portable OpenSSH |
Fix Released
|
Unknown
|
|||
openssh (Ubuntu) |
Fix Released
|
Medium
|
Colin Watson |
Bug Description
There is a patch to allow chrooting users that have the patched sftp-server as login shell and a '/./' magic in their
home directory.
This only affects sftp-server and does not require to setup a chroot environment with libs for anything.
http://
Changed in openssh: | |
assignee: | kamion → nobody |
Changed in openssh: | |
status: | Unknown → Confirmed |
Changed in openssh: | |
status: | Confirmed → Unknown |
Changed in openssh: | |
status: | Unknown → Confirmed |
Changed in openssh: | |
status: | Unknown → Fix Released |
Changed in openssh: | |
status: | In Progress → Fix Committed |
Changed in openssh: | |
status: | Fix Committed → Confirmed |
To post a comment you must log in.
Created an attachment (id=4827)
sftp-server.c: Allow chrooting of a user if he has a magic "/./" in his path