unbound/daemon
Petr Mensik c7f44b99e3 Change file mode before changing file owner
Change mode first when configuring remote control unix socket. Some
security systems might strip capability of changing other user's system
even to process with effective uid 0. That is done on Fedora by SELinux
policy and systemd for example. SELinux audit then shows errors, because
unbound tries modifying permissions of not own file. Fix just by mode
change as first step, make it owned by unbound:unbound user as the last
step only.

Related: rhbz#1905441
2022-01-07 12:08:32 +01:00
..
acl_list.c - Fix #259: Fix unbound-checkconf does not check view existence. 2020-07-07 09:00:04 +02:00
acl_list.h - Patch from Syzdek: Add ability to ignore RD bit and treat all 2018-05-30 09:33:21 +00:00
cachedump.c - Added serve-expired-ttl and serve-expired-ttl-reset options. 2018-08-28 14:21:56 +00:00
cachedump.h - #4102 for NSD, but for Unbound. Named unix pipes do not use 2018-06-12 07:43:52 +00:00
daemon.c - Fix lock debug code for gcc sanitizer reports. 2021-09-10 15:11:30 +02:00
daemon.h - Added RPZ response IP support 2019-07-16 18:43:16 +02:00
remote.c Change file mode before changing file owner 2022-01-07 12:08:32 +01:00
remote.h - Fix nettle compile. 2018-06-14 12:08:09 +00:00
stats.c Fix subnetcache statistics 2021-09-03 10:37:07 +02:00
stats.h - (for 1.6.3:) unbound.h exports the shm stats structures. They use 2017-04-13 12:47:29 +00:00
unbound.c - Fix lock debug code for gcc sanitizer reports. 2021-09-10 15:11:30 +02:00
worker.c Make explicit whether edns options are parsed from queries or responses 2021-11-15 13:40:51 +00:00
worker.h - (for 1.6.3:) unbound.h exports the shm stats structures. They use 2017-04-13 12:47:29 +00:00