]> asedeno.scripts.mit.edu Git - PuTTY.git/commit
Explicitly set the owning SID in make_private_security_descriptor.
authorSimon Tatham <anakin@pobox.com>
Tue, 13 May 2014 19:19:28 +0000 (19:19 +0000)
committerSimon Tatham <anakin@pobox.com>
Tue, 13 May 2014 19:19:28 +0000 (19:19 +0000)
commit323b0d3fdf9e0a1ff2594a4d97d54fbbafccb181
treea4b564a6f9df20041c1200d189bbd22e3ef9c5ba
parent566405ae68bc3358647d47ea00c5a7891f190933
Explicitly set the owning SID in make_private_security_descriptor.

Philippe Maupertuis reports that on one particular machine, Windows
causes the named pipe created by upstream PuTTY to be owned by the
Administrators group SID rather than the user's SID, which defeats the
security check in the downstream PuTTY. No other machine has been
reported to do this, but nonetheless it's clearly a thing that can
sometimes happen, so we now work around it by specifying explicitly in
the security descriptor for the pipe that its owner should be the user
SID rather than any other SID we might have the right to use.

[originally from svn r10188]
windows/winsecur.c