mirror of
https://github.com/NLnetLabs/unbound.git
synced 2026-01-01 12:29:36 -05:00
Change mode first when configuring remote control unix socket. Some security systems might strip capability of changing other user's system even to process with effective uid 0. That is done on Fedora by SELinux policy and systemd for example. SELinux audit then shows errors, because unbound tries modifying permissions of not own file. Fix just by mode change as first step, make it owned by unbound:unbound user as the last step only. Related: rhbz#1905441 |
||
|---|---|---|
| .. | ||
| acl_list.c | ||
| acl_list.h | ||
| cachedump.c | ||
| cachedump.h | ||
| daemon.c | ||
| daemon.h | ||
| remote.c | ||
| remote.h | ||
| stats.c | ||
| stats.h | ||
| unbound.c | ||
| worker.c | ||
| worker.h | ||