diff options
-rw-r--r-- | README.md | 4 | ||||
-rw-r--r-- | RELNOTES | 3 | ||||
-rw-r--r-- | src/fcopy/main.c | 3 | ||||
-rw-r--r-- | src/firejail/fs_home.c | 1 |
4 files changed, 10 insertions, 1 deletions
@@ -51,6 +51,10 @@ Use this issue to request new profiles: https://github.com/netblue30/firejail/is | |||
51 | ````` | 51 | ````` |
52 | 52 | ||
53 | ````` | 53 | ````` |
54 | ## AppImage type 2 support | ||
55 | ````` | ||
56 | |||
57 | ````` | ||
54 | ## New Profiles | 58 | ## New Profiles |
55 | xiphos, Tor Browser Bundle, display (imagemagik), Wire, mumble, zoom,Guayadeque | 59 | xiphos, Tor Browser Bundle, display (imagemagik), Wire, mumble, zoom,Guayadeque |
56 | 60 | ||
@@ -5,7 +5,10 @@ firejail (0.9.45) baseline; urgency=low | |||
5 | * security: invalid environment exploit found by Martin Carpenter | 5 | * security: invalid environment exploit found by Martin Carpenter |
6 | * security: split most of networking code in a separate executable | 6 | * security: split most of networking code in a separate executable |
7 | * security: split seccomp filter code configuration in a separate executable | 7 | * security: split seccomp filter code configuration in a separate executable |
8 | * security: split file copying in private option in a separate executable | ||
8 | * feature: allow root user access to /dev/shm (--noblacklist=/dev/shm) | 9 | * feature: allow root user access to /dev/shm (--noblacklist=/dev/shm) |
10 | * feature: AppImage type 2 support | ||
11 | * feature: test coverage (gcov) support | ||
9 | * new profiles: xiphos, Tor Browser Bundle, display (imagemagik), Wire, | 12 | * new profiles: xiphos, Tor Browser Bundle, display (imagemagik), Wire, |
10 | * new profiles: mumble, zoom, Guayadeque | 13 | * new profiles: mumble, zoom, Guayadeque |
11 | * bugfixes | 14 | * bugfixes |
diff --git a/src/fcopy/main.c b/src/fcopy/main.c index e3a04a515..b1e2813db 100644 --- a/src/fcopy/main.c +++ b/src/fcopy/main.c | |||
@@ -102,6 +102,9 @@ static void mkdir_attr(const char *fname, mode_t mode, uid_t uid, gid_t gid) { | |||
102 | } | 102 | } |
103 | 103 | ||
104 | void copy_link(const char *target, const char *linkpath, mode_t mode, uid_t uid, gid_t gid) { | 104 | void copy_link(const char *target, const char *linkpath, mode_t mode, uid_t uid, gid_t gid) { |
105 | (void) mode; | ||
106 | (void) uid; | ||
107 | (void) gid; | ||
105 | char *rp = realpath(target, NULL); | 108 | char *rp = realpath(target, NULL); |
106 | if (rp) { | 109 | if (rp) { |
107 | if (symlink(rp, linkpath) == -1) | 110 | if (symlink(rp, linkpath) == -1) |
diff --git a/src/firejail/fs_home.c b/src/firejail/fs_home.c index 1612da5d3..1f8da398e 100644 --- a/src/firejail/fs_home.c +++ b/src/firejail/fs_home.c | |||
@@ -406,7 +406,6 @@ static char *check_dir_or_file(const char *name) { | |||
406 | 406 | ||
407 | static void duplicate(char *name) { | 407 | static void duplicate(char *name) { |
408 | char *fname = check_dir_or_file(name); | 408 | char *fname = check_dir_or_file(name); |
409 | char *dest = RUN_HOME_DIR; | ||
410 | 409 | ||
411 | if (arg_debug) | 410 | if (arg_debug) |
412 | printf("Private home: duplicating %s\n", fname); | 411 | printf("Private home: duplicating %s\n", fname); |