diff options
author | netblue30 <netblue30@yahoo.com> | 2016-08-25 09:15:50 -0400 |
---|---|---|
committer | netblue30 <netblue30@yahoo.com> | 2016-08-25 09:15:50 -0400 |
commit | 3880034da5e0f8e387dd8cf79d8b973aaa87fffe (patch) | |
tree | 11cc6fa95f57475f68708d7ca8835ffb0e520b7e | |
parent | Merge pull request #743 from manevich/security (diff) | |
download | firejail-3880034da5e0f8e387dd8cf79d8b973aaa87fffe.tar.gz firejail-3880034da5e0f8e387dd8cf79d8b973aaa87fffe.tar.zst firejail-3880034da5e0f8e387dd8cf79d8b973aaa87fffe.zip |
command name fix
-rw-r--r-- | RELNOTES | 2 | ||||
-rw-r--r-- | src/firejail/util.c | 14 | ||||
-rw-r--r-- | todo | 16 |
3 files changed, 9 insertions, 23 deletions
@@ -40,7 +40,7 @@ firejail (0.9.42~rc2) baseline; urgency=low | |||
40 | * profiles: Atom Beta, Atom, jitsi, eom, uudeview | 40 | * profiles: Atom Beta, Atom, jitsi, eom, uudeview |
41 | * profiles: tar (gtar), unzip, unrar, file, skypeforlinux, | 41 | * profiles: tar (gtar), unzip, unrar, file, skypeforlinux, |
42 | * profiles: inox, Slack, gnome-chess. Gajim IM client | 42 | * profiles: inox, Slack, gnome-chess. Gajim IM client |
43 | -- netblue30 <netblue30@yahoo.com> Thu, 21 Jul 2016 08:00:00 -0500 | 43 | -- netblue30 <netblue30@yahoo.com> Thu, 24 Augl 2016 08:00:00 -0500 |
44 | 44 | ||
45 | firejail (0.9.40) baseline; urgency=low | 45 | firejail (0.9.40) baseline; urgency=low |
46 | * added --nice option | 46 | * added --nice option |
diff --git a/src/firejail/util.c b/src/firejail/util.c index 22434e200..5b407eaf5 100644 --- a/src/firejail/util.c +++ b/src/firejail/util.c | |||
@@ -425,13 +425,13 @@ void extract_command_name(int index, char **argv) { | |||
425 | errExit("strdup"); | 425 | errExit("strdup"); |
426 | 426 | ||
427 | // if we have a symbolic link, use the real path to extract the name | 427 | // if we have a symbolic link, use the real path to extract the name |
428 | if (is_link(argv[index])) { | 428 | // if (is_link(argv[index])) { |
429 | char*newname = realpath(argv[index], NULL); | 429 | // char*newname = realpath(argv[index], NULL); |
430 | if (newname) { | 430 | // if (newname) { |
431 | free(str); | 431 | // free(str); |
432 | str = newname; | 432 | // str = newname; |
433 | } | 433 | // } |
434 | } | 434 | // } |
435 | 435 | ||
436 | // configure command name | 436 | // configure command name |
437 | cfg.command_name = str; | 437 | cfg.command_name = str; |
@@ -247,7 +247,6 @@ References | |||
247 | 247 | ||
248 | 22. add support for read-write and noexec to Firetools | 248 | 22. add support for read-write and noexec to Firetools |
249 | 249 | ||
250 | |||
251 | 23. AppArmor | 250 | 23. AppArmor |
252 | 251 | ||
253 | $ sudo apt-get install apparmor apparmor-profiles apparmor-utils apparmor-notify | 252 | $ sudo apt-get install apparmor apparmor-profiles apparmor-utils apparmor-notify |
@@ -266,19 +265,6 @@ $ sudo aa-notify -p -f /var/log/audit/audit.log | |||
266 | 24. check monitor proc behaviour for sandboxes with --blacklist=/proc | 265 | 24. check monitor proc behaviour for sandboxes with --blacklist=/proc |
267 | also check --apparmor in this case | 266 | also check --apparmor in this case |
268 | 267 | ||
269 | 25. bring back strings.profile | 268 | 25. fix firemon and firetools on systems with hidepid=2 |
270 | |||
271 | # strings profile | ||
272 | quiet | ||
273 | ignore noroot | ||
274 | include /etc/firejail/default.profile | ||
275 | tracelog | ||
276 | net none | ||
277 | shell none | ||
278 | private-dev | ||
279 | private-tmp | ||
280 | nosound | ||
281 | |||
282 | 26. fix firemon and firetools on systems with hidepid=2 | ||
283 | 269 | ||
284 | sudo mount -o remount,rw,hidepid=2 /proc | 270 | sudo mount -o remount,rw,hidepid=2 /proc |