doczkal / rpms / abrt

Forked from rpms/abrt 4 years ago
Clone

Blame SOURCES/0039-ccpp-run-vulnerability-analysis-in-analyze_LocalGDB.patch

b404a9
From f9b0c9a296453cd817cc5d9a2e54ec6b4e123967 Mon Sep 17 00:00:00 2001
b404a9
From: Jakub Filak <jfilak@redhat.com>
b404a9
Date: Tue, 25 Feb 2014 17:53:42 +0100
b404a9
Subject: [ABRT PATCH 39/40] ccpp: run vulnerability analysis in
b404a9
 analyze_LocalGDB
b404a9
b404a9
The vulnerability analysis has been moved from 'post-create' to
b404a9
'analyze_LocalGDB' because gdb should not be run for random coredump
b404a9
under root user.
b404a9
b404a9
Closes rhbz#1069719
b404a9
b404a9
Signed-off-by: Jakub Filak <jfilak@redhat.com>
b404a9
---
b404a9
 src/plugins/ccpp_event.conf | 5 +++--
b404a9
 1 file changed, 3 insertions(+), 2 deletions(-)
b404a9
b404a9
diff --git a/src/plugins/ccpp_event.conf b/src/plugins/ccpp_event.conf
b404a9
index ccc9e83..62ff08a 100644
b404a9
--- a/src/plugins/ccpp_event.conf
b404a9
+++ b/src/plugins/ccpp_event.conf
b404a9
@@ -19,8 +19,6 @@ EVENT=post-create analyzer=CCpp
b404a9
         ##satyr migration:
b404a9
         #satyr abrt-create-core-stacktrace "$DUMP_DIR"
b404a9
         abrt-action-generate-core-backtrace
b404a9
-        # Run GDB plugin to see if crash looks exploitable
b404a9
-        abrt-action-analyze-vulnerability
b404a9
         # Generate hash
b404a9
         abrt-action-analyze-c &&
b404a9
         abrt-action-list-dsos -m maps -o dso_list &&
b404a9
@@ -70,6 +68,9 @@ EVENT=collect_xsession_errors analyzer=CCpp dso_list~=.*/libX11.*
b404a9
 # TODO: can we still specify additional directories to search for debuginfos,
b404a9
 # or was this ability lost with move to python installer?
b404a9
 EVENT=analyze_LocalGDB analyzer=CCpp
b404a9
+        # Run GDB plugin to see if crash looks exploitable
b404a9
+        abrt-action-analyze-vulnerability
b404a9
+        # Run GDB to genereate backtrace
b404a9
         abrt-action-analyze-ccpp-local --without-bodhi
b404a9
 
b404a9
 
b404a9
-- 
b404a9
1.8.3.1
b404a9