mirror of
git://git.yoctoproject.org/meta-selinux
synced 2026-01-01 13:58:04 +00:00
ChangeLog: https://github.com/SELinuxProject/selinux/releases/tag/3.8 * libsemanage: Preserve file context and ownership in policy store * libselinux: deprecate security_disable(3) * libsepol: Support nlmsg extended permissions * libsepol: Add policy capability netlink_xperm * libsemanage: Optionally allow duplicate declarations * policycoreutils: introduce unsetfiles * libselinux/utils: introduce selabel_compare * improved selabel_lookup performance * libselinux: support parallel usage of selabel_lookup(3) * libsepol: add support for xperms in conditional policies * Improved man pages * Code improvements and bug fixes * Always build for LFS mode on 32-bit archs. * libsemanage: Mute error messages from selinux_restorecon introduced in 3.8-rc1 * Regex spec ordering is restored to pre 3.8-rc1 * Binary fcontext files format changed, files using old format are ignored * Code improvements and bug fixes License-Update: White space cleanup for libsemanage/LICENSE Signed-off-by: Yi Zhao <yi.zhao@windriver.com> Signed-off-by: Joe MacDonald <joe.macdonald@siemens.com>
35 lines
1.1 KiB
Diff
35 lines
1.1 KiB
Diff
From 418a2736fd7da15758ab84f9448e7517e3ad82c1 Mon Sep 17 00:00:00 2001
|
|
From: Xin Ouyang <Xin.Ouyang@windriver.com>
|
|
Date: Mon, 26 Mar 2012 15:15:16 +0800
|
|
Subject: [PATCH] libsemanage: Fix execve segfaults on Ubuntu.
|
|
|
|
semanage_exec_prog() has pass NULL as param 2 to call execve(),
|
|
this may cause segfaults on Ubuntu.
|
|
Such as "make load" while building refpolicy.
|
|
|
|
http://oss.tresys.com/pipermail/refpolicy/2011-December/004859.html
|
|
|
|
Upstream-Status: Inappropriate [embedded specific]
|
|
|
|
Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
|
|
---
|
|
src/semanage_store.c | 2 +-
|
|
1 file changed, 1 insertion(+), 1 deletion(-)
|
|
|
|
diff --git a/src/semanage_store.c b/src/semanage_store.c
|
|
index 2ca2e90..914d720 100644
|
|
--- a/src/semanage_store.c
|
|
+++ b/src/semanage_store.c
|
|
@@ -1445,7 +1445,7 @@ static int semanage_exec_prog(semanage_handle_t * sh,
|
|
if (forkval == 0) {
|
|
/* child process. file descriptors will be closed
|
|
* because they were set as close-on-exec. */
|
|
- execve(e->path, argv, NULL);
|
|
+ execv(e->path, argv);
|
|
_exit(EXIT_FAILURE); /* if execve() failed */
|
|
}
|
|
|
|
--
|
|
2.25.1
|
|
|