mirror of
https://github.com/NLnetLabs/unbound.git
synced 2025-12-25 00:59:37 -05:00
Change mode first when configuring remote control unix socket. Some security systems might strip capability of changing other user's system even to process with effective uid 0. That is done on Fedora by SELinux policy and systemd for example. SELinux audit then shows errors, because unbound tries modifying permissions of not own file. Fix just by mode change as first step, make it owned by unbound:unbound user as the last step only. Related: rhbz#1905441 |
||
|---|---|---|
| .. | ||
| acl_list.c | ||
| acl_list.h | ||
| cachedump.c | ||
| cachedump.h | ||
| daemon.c | ||
| daemon.h | ||
| remote.c | ||
| remote.h | ||
| stats.c | ||
| stats.h | ||
| unbound.c | ||
| worker.c | ||
| worker.h | ||