1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44
|
From: Joe Orton <jorton@apache.org>
Date: Fri, 15 Aug 2025 07:38:26 +0000
Subject: [PATCH] * modules/arch/unix/mod_unixd.ci (ap_unixd_setup_child):
Do not test euid=0 before going chroot MIME-Version: 1.0 Content-Type:
text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
Nowaday chroot need CAP_SYS_CHROOT capability in its user namespace, and could
work without root.
Will allow to use chroot with lesser permission.
Submitted by: Bastien Roucariès <rouca debian.org>
PR: 69767
Github: closes #549
git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1927804 13f79535-47bb-0310-9956-ffa450edef68
bug: https://github.com/apache/httpd/pull/549
origin: https://github.com/apache/httpd/commit/5c9c78d7859f6a45e8267f7017313002316c3257
bug-debian: https://bugs.debian.org/1091855
---
modules/arch/unix/mod_unixd.c | 7 -------
1 file changed, 7 deletions(-)
diff --git a/modules/arch/unix/mod_unixd.c b/modules/arch/unix/mod_unixd.c
index 1baa278..fb475c3 100644
--- a/modules/arch/unix/mod_unixd.c
+++ b/modules/arch/unix/mod_unixd.c
@@ -145,13 +145,6 @@ unixd_drop_privileges(apr_pool_t *pool, server_rec *s)
}
if (NULL != ap_unixd_config.chroot_dir) {
- if (geteuid()) {
- rv = errno;
- ap_log_error(APLOG_MARK, APLOG_ALERT, errno, NULL, APLOGNO(02158)
- "Cannot chroot when not started as root");
- return rv;
- }
-
if (chdir(ap_unixd_config.chroot_dir) != 0) {
rv = errno;
ap_log_error(APLOG_MARK, APLOG_ALERT, errno, NULL, APLOGNO(02159)
|