t;" || $? != 0 ]]; then
ret=1
fi
exit $ret
--
* Fixing the bug
This patch introduces the use of safe_execveat instead of
safe_execve for the emulation of execve. By using the do_openat
function, we ensure that the executable file descriptor is really
the
, since the
former is now useless.
Signed-off-by: Olivier Dion
---
linux-user/syscall.c | 16 +---
1 file changed, 13 insertions(+), 3 deletions(-)
diff --git a/linux-user/syscall.c b/linux-user/syscall.c
index e2af3c1494..68340bcb67 100644
--- a/linux-user/syscall.c
+++ b/linux-user
On 2019-08-23T12:58:43-0400, Laurent Vivier wrote:
> Le 07/08/2019 à 15:54, d...@linutronix.de a écrit :
> > From: Olivier Dion
> >
> > If not handled, QEMU will execve itself instead of the emulated
> > process. This could result in potential security risk.
> &