mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-28 06:13:31 +01:00
9b4ac986cb
When running with User set, we frequently try to look up our information in the user database (e.g., /etc/passwd). The seccomp2 sandbox setup doesn't let us open /etc/passwd, and probably shouldn't. To fix this, we have a pair of wrappers for getpwnam and getpwuid. When a real call to getpwnam or getpwuid fails, they fall back to a cached value, if the uid/gid matches. (Granting access to /etc/passwd isn't possible with the way we handle opening files through the sandbox. It's not desirable either.)
6 lines
209 B
Plaintext
6 lines
209 B
Plaintext
o Minor bugfixes (sandbox):
|
|
|
|
- Handle failures in getpwnam()/getpwuid() when running with the
|
|
User option set and the Linux syscall sandbox enabled. Fixes bug
|
|
11946; bugfix on 0.2.5.1-alpha.
|