Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

gh-112800: Ignore PermissionError on SubprocessTransport.close()#112803

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to ourterms of service andprivacy statement. We’ll occasionally send you account related emails.

Already on GitHub?Sign in to your account

Merged

Conversation

@allisonkarlitskaya
Copy link
Contributor

@allisonkarlitskayaallisonkarlitskaya commentedDec 6, 2023
edited by bedevere-appbot
Loading

In case the spawned process is setuid, we may not be able to send signals to it, in which case our .kill() call will raise PermissionError.

Ignore that in order to avoid .close() raising an exception. Hopefully the process will exit as a result of receiving EOF on its stdin.

Closes#112800

@ghost
Copy link

ghost commentedDec 6, 2023
edited by ghost
Loading

All commit authors signed the Contributor License Agreement.
CLA signed

@bedevere-app
Copy link

Most changes to Pythonrequire a NEWS entry. Add one using theblurb_it web app or theblurb command-line tool.

If this change has little impact on Python users, wait for a maintainer to apply theskip news label instead.

In case the spawned process is setuid, we may not be able to sendsignals to it, in which case our .kill() call will raisePermissionError.Ignore that in order to avoid .close() raising an exception.  Hopefullythe process will exit as a result of receiving EOF on its stdin.
Copy link
Member

@gvanrossumgvanrossum left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

Hey! Sorry for the delay. This makes sense. I was going to ask for a test, but of course that's pointless since we're not going to be writing tests that depend on setuid programs. The fix is really minimal, so I'm going to merge this.

Do you have an opinion on whether this is important enough to backport the fix to 3.12 or 3.11?

@gvanrossumgvanrossum merged commit0187a7e intopython:mainDec 24, 2023
@gvanrossumgvanrossum added the 3.12only security fixes labelDec 24, 2023
ryan-duve pushed a commit to ryan-duve/cpython that referenced this pull requestDec 26, 2023
…) in asyncio (python#112803)In case the spawned process is setuid, we may not be able to sendsignals to it, in which case our .kill() call will raisePermissionError.Ignore that in order to avoid .close() raising an exception.  Hopefullythe process will exit as a result of receiving EOF on its stdin.
kulikjak pushed a commit to kulikjak/cpython that referenced this pull requestJan 22, 2024
…) in asyncio (python#112803)In case the spawned process is setuid, we may not be able to sendsignals to it, in which case our .kill() call will raisePermissionError.Ignore that in order to avoid .close() raising an exception.  Hopefullythe process will exit as a result of receiving EOF on its stdin.
aisk pushed a commit to aisk/cpython that referenced this pull requestFeb 11, 2024
…) in asyncio (python#112803)In case the spawned process is setuid, we may not be able to sendsignals to it, in which case our .kill() call will raisePermissionError.Ignore that in order to avoid .close() raising an exception.  Hopefullythe process will exit as a result of receiving EOF on its stdin.
Glyphack pushed a commit to Glyphack/cpython that referenced this pull requestSep 2, 2024
…) in asyncio (python#112803)In case the spawned process is setuid, we may not be able to sendsignals to it, in which case our .kill() call will raisePermissionError.Ignore that in order to avoid .close() raising an exception.  Hopefullythe process will exit as a result of receiving EOF on its stdin.
Sign up for freeto join this conversation on GitHub. Already have an account?Sign in to comment

Reviewers

@gvanrossumgvanrossumgvanrossum approved these changes

@1st11st1Awaiting requested review from 1st11st1 is a code owner

@asvetlovasvetlovAwaiting requested review from asvetlovasvetlov is a code owner

@kumaraditya303kumaraditya303Awaiting requested review from kumaraditya303kumaraditya303 is a code owner

@willingcwillingcAwaiting requested review from willingcwillingc is a code owner

Assignees

No one assigned

Labels

3.12only security fixes

Projects

None yet

Milestone

No milestone

Development

Successfully merging this pull request may close these issues.

SubprocessTransport .close() can fail with PermissionError with setuid programs

2 participants

@allisonkarlitskaya@gvanrossum

[8]ページ先頭

©2009-2025 Movatter.jp