Commit Briefs

Omar Polo

configure: add --disable-sandbox (tags/1.6.2)

Calling `configure' with --disable-sandbox will disable the sandbox support *completely* at compile time. gmid will still complain at compile time and during the startup. Users shouldn't disable the sandbox if possible, but instead report problem upstream so they get fixed (hopefully.) #4 related


Omar Polo

reworked seccomp filter

* SECCOMP_AUDIT_ARCH extended to support more architectures * relax fcntl policy: allow the syscall regardless of the flags * wrap every syscall in a ifdef, and add some (statx, fcntl64, ...) used in x86 Some bits were taken from dhcpcd[0], thanks! [0]: https://roy.marples.name/git/dhcpcd/blob/HEAD:/src/privsep-linux.c


Omar Polo

cherry-picking commit c928dcc7ba12c5040127e33485b246b13dd63ed9 (github/hotfix-iri-parse-inf-loop, tags/v1.6.1)


Omar Polo

fix IRI-parsing bug

Some particularly crafted IRIs can cause a denial of service (DOS). IRIs which have a trailing `..' segment and resolve to a valid IRI (i.e. a .. that's not escaping the root directory) will make the server process loop forever. This is """just""" an DOS vulnerability, it doesn't expose anything sensitive or give an attacker anything else.


Omar Polo

gmid v1.6 -- "Stargazers" (tags/v1.6)


Omar Polo

typo


Omar Polo

update README


Omar Polo

typo


Omar Polo

fix signal handling so it works on linux too

it seems that linux calls the signal handlers even when we're waiting on sigwait for that signal. Work around that.


Omar Polo

[seccomp] allow prlimit64

it's needed by getdtablesize, at least on glibc



Omar Polo

sync changelog


Omar Polo

kill only $pid during regress testing

before we did `pkill gmid', but that would influence also other instances of gmid!



Omar Polo

move all sandbox-related code to sandbox.c

while there, add capsicum for the logger process