diff options
author | Nick Mathewson <nickm@torproject.org> | 2014-05-14 13:53:14 -0400 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2014-05-14 13:53:14 -0400 |
commit | 9b4ac986cbe8867c24c8e77654a4b7e75f870738 (patch) | |
tree | a70f07445bda6a29d21a1cc8619b6cc748813919 /changes | |
parent | e12af2adb0919d0de6d6ba44462d9255f63fca5b (diff) | |
download | tor-9b4ac986cbe8867c24c8e77654a4b7e75f870738.tar.gz tor-9b4ac986cbe8867c24c8e77654a4b7e75f870738.zip |
Use tor_getpw{nam,uid} wrappers to fix bug 11946
When running with User set, we frequently try to look up our
information in the user database (e.g., /etc/passwd). The seccomp2
sandbox setup doesn't let us open /etc/passwd, and probably
shouldn't.
To fix this, we have a pair of wrappers for getpwnam and getpwuid.
When a real call to getpwnam or getpwuid fails, they fall back to a
cached value, if the uid/gid matches.
(Granting access to /etc/passwd isn't possible with the way we
handle opening files through the sandbox. It's not desirable either.)
Diffstat (limited to 'changes')
-rw-r--r-- | changes/bug11946 | 5 |
1 files changed, 5 insertions, 0 deletions
diff --git a/changes/bug11946 b/changes/bug11946 new file mode 100644 index 0000000000..9ea48311bd --- /dev/null +++ b/changes/bug11946 @@ -0,0 +1,5 @@ + o Minor bugfixes (sandbox): + + - Handle failures in getpwnam()/getpwuid() when running with the + User option set and the Linux syscall sandbox enabled. Fixes bug + 11946; bugfix on 0.2.5.1-alpha. |