diff options
author | Patrick J Volkerding <volkerdi@slackware.com> | 2023-11-07 19:57:12 +0000 |
---|---|---|
committer | Eric Hameleers <alien@slackware.com> | 2023-11-07 21:28:19 +0100 |
commit | 69753b9a1da83d78dab7943e3fcdb428ee74a254 (patch) | |
tree | 9c58cf752080a6715fe80639e22491bbb8be31d2 /source/n/bind/rc.bind | |
parent | 16aecb6aa38eaab548b9aece32c6aa72f59e80b2 (diff) | |
download | current-69753b9a1da83d78dab7943e3fcdb428ee74a254.tar.gz current-69753b9a1da83d78dab7943e3fcdb428ee74a254.tar.xz |
Tue Nov 7 19:57:12 UTC 202320231107195712
ap/sudo-1.9.15-x86_64-1.txz: Upgraded.
The sudoers plugin has been modified to make it more resilient to ROWHAMMER
attacks on authentication and policy matching.
The sudoers plugin now constructs the user time stamp file path name using
the user-ID instead of the user name. This avoids a potential problem with
user names that contain a path separator ('/') being interpreted as part of
the path name.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2023-42465
https://www.cve.org/CVERecord?id=CVE-2023-42456
(* Security fix *)
ap/vim-9.0.2092-x86_64-1.txz: Upgraded.
l/libuv-1.47.0-x86_64-1.txz: Upgraded.
l/xapian-core-1.4.24-x86_64-1.txz: Upgraded.
n/bind-9.18.19-x86_64-2.txz: Rebuilt.
Don't go automatically chowning files in /var/named, since some users may
have special requirements. But in case anyone finds that behavior useful,
you may set NAMED_CHOWN=YES in /etc/default/named to turn it back on.
Unless anyone has a good objection to it, this change is considered pending
for the next BIND upgrades in -stable.
Thanks to Mig21.
xap/vim-gvim-9.0.2092-x86_64-1.txz: Upgraded.
Diffstat (limited to '')
-rw-r--r-- | source/n/bind/rc.bind | 12 |
1 files changed, 7 insertions, 5 deletions
diff --git a/source/n/bind/rc.bind b/source/n/bind/rc.bind index 169db8126..1b0b4d6fb 100644 --- a/source/n/bind/rc.bind +++ b/source/n/bind/rc.bind @@ -42,11 +42,13 @@ bind_start() { mkdir -p /var/run/named # Make sure that /var/run/named has correct ownership: chown -R ${NAMED_USER}:${NAMED_GROUP} /var/run/named - # Make sure that /var/named has correct ownership: - chown -R ${NAMED_USER}:${NAMED_GROUP} /var/named - if [ -r /etc/rndc.key ]; then - # Make sure that /etc/rndc.key has correct ownership: - chown ${NAMED_USER}:${NAMED_GROUP} /etc/rndc.key + if [ "$NAMED_CHOWN" = "YES" ]; then + # Make sure that /var/named has correct ownership: + chown -R ${NAMED_USER}:${NAMED_GROUP} /var/named + if [ -r /etc/rndc.key ]; then + # Make sure that /etc/rndc.key has correct ownership: + chown ${NAMED_USER}:${NAMED_GROUP} /etc/rndc.key + fi fi # Start named: if [ -x /usr/sbin/named ]; then |