From 4840712323d034e7452f63d6f747cc6a78d364c0 Mon Sep 17 00:00:00 2001 From: netblue30 Date: Fri, 18 Nov 2016 10:09:26 -0500 Subject: cleanup --- README.md | 4 ++++ RELNOTES | 3 +++ src/fcopy/main.c | 3 +++ src/firejail/fs_home.c | 1 - 4 files changed, 10 insertions(+), 1 deletion(-) diff --git a/README.md b/README.md index ad90639e2..b29ad476e 100644 --- a/README.md +++ b/README.md @@ -50,6 +50,10 @@ Use this issue to request new profiles: https://github.com/netblue30/firejail/is # Current development version: 0.9.45 ````` +````` +## AppImage type 2 support +````` + ````` ## New Profiles xiphos, Tor Browser Bundle, display (imagemagik), Wire, mumble, zoom,Guayadeque diff --git a/RELNOTES b/RELNOTES index e726674ec..38da86b6e 100644 --- a/RELNOTES +++ b/RELNOTES @@ -5,7 +5,10 @@ firejail (0.9.45) baseline; urgency=low * security: invalid environment exploit found by Martin Carpenter * security: split most of networking code in a separate executable * security: split seccomp filter code configuration in a separate executable + * security: split file copying in private option in a separate executable * feature: allow root user access to /dev/shm (--noblacklist=/dev/shm) + * feature: AppImage type 2 support + * feature: test coverage (gcov) support * new profiles: xiphos, Tor Browser Bundle, display (imagemagik), Wire, * new profiles: mumble, zoom, Guayadeque * bugfixes diff --git a/src/fcopy/main.c b/src/fcopy/main.c index e3a04a515..b1e2813db 100644 --- a/src/fcopy/main.c +++ b/src/fcopy/main.c @@ -102,6 +102,9 @@ static void mkdir_attr(const char *fname, mode_t mode, uid_t uid, gid_t gid) { } void copy_link(const char *target, const char *linkpath, mode_t mode, uid_t uid, gid_t gid) { + (void) mode; + (void) uid; + (void) gid; char *rp = realpath(target, NULL); if (rp) { if (symlink(rp, linkpath) == -1) diff --git a/src/firejail/fs_home.c b/src/firejail/fs_home.c index 1612da5d3..1f8da398e 100644 --- a/src/firejail/fs_home.c +++ b/src/firejail/fs_home.c @@ -406,7 +406,6 @@ static char *check_dir_or_file(const char *name) { static void duplicate(char *name) { char *fname = check_dir_or_file(name); - char *dest = RUN_HOME_DIR; if (arg_debug) printf("Private home: duplicating %s\n", fname); -- cgit v1.2.3-54-g00ecf