summaryrefslogtreecommitdiff
path: root/man
diff options
context:
space:
mode:
authorGuillem Jover <guillem@debian.org>2019-02-15 05:09:11 +0100
committerGuillem Jover <guillem@debian.org>2019-02-23 15:23:54 +0100
commit754511aaef556ebad03560e689eeb2044a7ee1fd (patch)
tree538a2e89e14b6d75e358fe44c6efb35507619a43 /man
parent90f657a644d87f96d0161ddf0d039a61d77c6d93 (diff)
downloaddpkg-754511aaef556ebad03560e689eeb2044a7ee1fd.tar.gz
s-s-d(1): Document behavior of --pidfile security checks
Describe what to expect from these new checks. Closes: #921557
Diffstat (limited to 'man')
-rw-r--r--man/start-stop-daemon.man9
1 files changed, 6 insertions, 3 deletions
diff --git a/man/start-stop-daemon.man b/man/start-stop-daemon.man
index 4723596d3..b6513cedd 100644
--- a/man/start-stop-daemon.man
+++ b/man/start-stop-daemon.man
@@ -122,11 +122,14 @@ Note: using this matching option alone might cause unintended processes to
be acted on, if the old process terminated without being able to remove the
\fIpid-file\fP.
.IP
-\fBWarning:\fP Using this match option alone with a daemon that writes the
-pidfile as an unprivileged user is a security risk, because if the daemon
-gets compromised the contents of the pidfile cannot be trusted, and then
+\fBWarning:\fP using this match option with a world-writable pidfile or using
+it alone with a daemon that writes the pidfile as an unprivileged (non-root)
+user will be refused with an error (since version 1.19.3) as this is a
+security risk, because either any user can write to it, or if the daemon
+gets compromised, the contents of the pidfile cannot be trusted, and then
a privileged runner (such as an init script executed as root) would end up
acting on any system process.
+Using \fI/dev/null\fP is excempt from these checks.
.TP
.BR \-x ", " \-\-exec " \fIexecutable\fP"
Check for processes that are instances of this \fIexecutable\fP. The