I agree on the general point, though: Avoid projects with "written in X" descriptions.
I agree on the general point, though: Avoid projects with "written in X" descriptions.
To me it it seems that the decision about uutils/coreutils being ready for production use in Ubuntu (which it wasn't) was driven by PR rather than by people who knew what they were doing.
To me it it seems that the decision about uutils/coreutils being ready for production use in Ubuntu (which it wasn't) was driven by PR rather than by people who knew what they were doing.
The language and its merits seem like a feature to language advocates, much less to users.
No matter if L is Rust, Python/Ruby/"modern C++"
The language and its merits seem like a feature to language advocates, much less to users.
No matter if L is Rust, Python/Ruby/"modern C++"
strace -o perl2.trace perl -e '@x = getpwuid($<); print "@x\n"'; grep shadow perl2.trace
…accesses /etc/shadow while…
strace -o perl1.trace perl -e '$x = getpwuid($<); print "$x\n"'; grep shadow perl1.trace
…dowsn't.
strace -o perl2.trace perl -e '@x = getpwuid($<); print "@x\n"'; grep shadow perl2.trace
…accesses /etc/shadow while…
strace -o perl1.trace perl -e '$x = getpwuid($<); print "$x\n"'; grep shadow perl1.trace
…dowsn't.
my ($user, $pwd, $uid, $gid) = getpwuid $>;
…this is where the /etc/shadow access happens. Only $user, $gid are used. getpwuid is a Perl builtin, also defined in the POSIX module. (Perl documentation says the 2 versions behave identically, though.)
my ($user, $pwd, $uid, $gid) = getpwuid $>;
…this is where the /etc/shadow access happens. Only $user, $gid are used. getpwuid is a Perl builtin, also defined in the POSIX module. (Perl documentation says the 2 versions behave identically, though.)
user_cluster_map: Return the PostgreSQL version, cluster, and database to connect to.
There are some getpwuid, getgrid function calls there but nothing that explains /etc/shadow.
I'll add the function to my script copy and try modifying that…
user_cluster_map: Return the PostgreSQL version, cluster, and database to connect to.
There are some getpwuid, getgrid function calls there but nothing that explains /etc/shadow.
I'll add the function to my script copy and try modifying that…
($version, $cluster, $db) = user_cluster_map() unless ($cluster or $explicit_host or $explicit_port);
…the access does not happen.
($version, $cluster, $db) = user_cluster_map() unless ($cluster or $explicit_host or $explicit_port);
…the access does not happen.
Running that wrapper without an argument (exiting early) also leads to a /etc/shadow access attempt – and running the real psql binary (/usr/lib/postgresql/$VERSION/bin/psql) does not.
pg_wrapper is a Perl program.
Running that wrapper without an argument (exiting early) also leads to a /etc/shadow access attempt – and running the real psql binary (/usr/lib/postgresql/$VERSION/bin/psql) does not.
pg_wrapper is a Perl program.
Using ltrace -S (for logging library calls and syscalls) I get log entries that the shadow read attempt comes from within getspnam_r.
Using ltrace -S (for logging library calls and syscalls) I get log entries that the shadow read attempt comes from within getspnam_r.
I find this behavior curious – and I can reproduce it on a Debian/unstable box. Why does this happen?
If nscd is running, it is contacted before.
I find this behavior curious – and I can reproduce it on a Debian/unstable box. Why does this happen?
If nscd is running, it is contacted before.
- New configuration option to filter events based on IP addresses, ports in SOCKADDR messages
- Bug fixes to avoid wrong/misleading SYSCALL.SCRIPT enrichments
- New configuration option to filter events based on IP addresses, ports in SOCKADDR messages
- Bug fixes to avoid wrong/misleading SYSCALL.SCRIPT enrichments
👊🇺🇸🔥
(that's how this works, right?)
👊🇺🇸🔥
(that's how this works, right?)
- Save state across restarts
- Apply labels for executables to processes found in /proc
- Fix parsing errors in some non-"enriched" messages
- Fix missing uid/gid translations
- More flexible permissions for log files
- SELinux, AppArmor policy updates
- Configurable build id
- Save state across restarts
- Apply labels for executables to processes found in /proc
- Fix parsing errors in some non-"enriched" messages
- Fix missing uid/gid translations
- More flexible permissions for log files
- SELinux, AppArmor policy updates
- Configurable build id