|
|
d046e9 |
diff -ru firefox-78.3.0/security/sandbox/linux/SandboxFilter.cpp firefox-78.4.0/security/sandbox/linux/SandboxFilter.cpp
|
|
|
d046e9 |
--- firefox-78.3.0/security/sandbox/linux/SandboxFilter.cpp 2020-09-14 21:21:02.000000000 +0200
|
|
|
d046e9 |
+++ firefox-78.4.0/security/sandbox/linux/SandboxFilter.cpp 2020-10-14 11:34:48.000000000 +0200
|
|
|
d046e9 |
@@ -243,14 +243,21 @@
|
|
|
d046e9 |
auto path = reinterpret_cast<const char*>(aArgs.args[1]);
|
|
|
d046e9 |
auto buf = reinterpret_cast<statstruct*>(aArgs.args[2]);
|
|
|
d046e9 |
auto flags = static_cast<int>(aArgs.args[3]);
|
|
|
d046e9 |
+
|
|
|
d046e9 |
+ if (fd != AT_FDCWD && (flags & AT_EMPTY_PATH) != 0 &&
|
|
|
d046e9 |
+ strcmp(path, "") == 0) {
|
|
|
d046e9 |
+ return ConvertError(fstatsyscall(fd, buf));
|
|
|
d046e9 |
+ }
|
|
|
d046e9 |
+
|
|
|
d046e9 |
if (fd != AT_FDCWD && path[0] != '/') {
|
|
|
d046e9 |
SANDBOX_LOG_ERROR("unsupported fd-relative fstatat(%d, \"%s\", %p, %d)",
|
|
|
d046e9 |
fd, path, buf, flags);
|
|
|
d046e9 |
return BlockedSyscallTrap(aArgs, nullptr);
|
|
|
d046e9 |
}
|
|
|
d046e9 |
- if ((flags & ~AT_SYMLINK_NOFOLLOW) != 0) {
|
|
|
d046e9 |
+ if ((flags & ~(AT_SYMLINK_NOFOLLOW | AT_NO_AUTOMOUNT)) != 0) {
|
|
|
d046e9 |
SANDBOX_LOG_ERROR("unsupported flags %d in fstatat(%d, \"%s\", %p, %d)",
|
|
|
d046e9 |
- (flags & ~AT_SYMLINK_NOFOLLOW), fd, path, buf, flags);
|
|
|
d046e9 |
+ (flags & ~(AT_SYMLINK_NOFOLLOW | AT_NO_AUTOMOUNT)), fd,
|
|
|
d046e9 |
+ path, buf, flags);
|
|
|
d046e9 |
return BlockedSyscallTrap(aArgs, nullptr);
|
|
|
d046e9 |
}
|
|
|
d046e9 |
return (flags & AT_SYMLINK_NOFOLLOW) == 0 ? broker->Stat(path, buf)
|