[tor-commits] [tor/release-0.3.5] seccomp2: Add "shutdown" to the list of permitted system calls.

nickm at torproject.org nickm at torproject.org
Tue Nov 13 21:48:30 UTC 2018


commit 0e5378feeca5d67b7e8f5550eaf7fcd87b8f59ea
Author: Nick Mathewson <nickm at torproject.org>
Date:   Mon Nov 12 08:23:58 2018 -0500

    seccomp2: Add "shutdown" to the list of permitted system calls.
    
    We don't use this syscall, but openssl apparently does.
    
    (This syscall puts a socket into a half-closed state. Don't worry:
    It doesn't shut down the system or anything.)
    
    Fixes bug 28183; bugfix on 0.2.5.1-alpha where the sandbox was
    introduced.
---
 changes/bug28183     | 4 ++++
 src/common/sandbox.c | 2 +-
 2 files changed, 5 insertions(+), 1 deletion(-)

diff --git a/changes/bug28183 b/changes/bug28183
new file mode 100644
index 000000000..8d35dcdc0
--- /dev/null
+++ b/changes/bug28183
@@ -0,0 +1,4 @@
+  o Minor bugfixes (Linux seccomp2 sandbox):
+    - Permit the "shutdown()" system call, which is apparently
+      used by OpenSSL under some circumstances. Fixes bug 28183;
+      bugfix on 0.2.5.1-alpha.
diff --git a/src/common/sandbox.c b/src/common/sandbox.c
index 0a972d496..3b21322d3 100644
--- a/src/common/sandbox.c
+++ b/src/common/sandbox.c
@@ -205,6 +205,7 @@ static int filter_nopar_gen[] = {
 #ifdef __NR_setrlimit
     SCMP_SYS(setrlimit),
 #endif
+    SCMP_SYS(shutdown),
 #ifdef __NR_sigaltstack
     SCMP_SYS(sigaltstack),
 #endif
@@ -2013,4 +2014,3 @@ sandbox_disable_getaddrinfo_cache(void)
 {
 }
 #endif
-





More information about the tor-commits mailing list