Summary: | ttyname's new strict dependency on /proc breaks chrooted applications | ||
---|---|---|---|
Product: | glibc | Reporter: | Jitendra Nair <jnair> |
Component: | libc | Assignee: | Ulrich Drepper <drepper.fsp> |
Status: | RESOLVED DUPLICATE | ||
Severity: | critical | CC: | fweimer, glibc-bugs, shekhar.tiwatne |
Priority: | P1 | Flags: | fweimer:
security-
|
Version: | 2.4 | ||
Target Milestone: | --- | ||
Host: | Target: | ||
Build: | Last reconfirmed: |
Description
Jitendra Nair
2006-10-12 11:38:26 UTC
glibc cannot work reliably at all without /proc. This is (unfortunately) the only interface to all kinds of kernel details. BTW, if you for whatever reason don't want to mount whole /proc into the chroots, you can always at least mount --bind there parts of it sufficient enough to make all programs you want to run in the chroot happy. (In reply to comment #2) > BTW, if you for whatever reason don't want to mount whole /proc into the chroots, > you can always at least mount --bind there parts of it sufficient enough > to make all programs you want to run in the chroot happy. I agree but, 'ttyname' i belive does a 'readlink' on '/proc/self/fd/n' and 'self' will be known only to the forked 'sshd' child,so binding 'part' of the proc fs in this case is not possible. Hope i got it right. Fixed. *** This bug has been marked as a duplicate of bug 1451 *** |