summaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
* cal: support abbreviated month namesKarel Zak2016-10-072-4/+21
| | | | Signed-off-by: Karel Zak <kzak@redhat.com>
* cal: support alone month name parameterKarel Zak2016-10-072-7/+16
| | | | | | For example 'cal August' to print August for the current year. Signed-off-by: Karel Zak <kzak@redhat.com>
* cal: cleanup man pageKarel Zak2016-10-071-20/+22
| | | | Signed-off-by: Karel Zak <kzak@redhat.com>
* cal: remove err message from monthname_to_number()Karel Zak2016-10-071-3/+7
| | | | Signed-off-by: Karel Zak <kzak@redhat.com>
* docs: update AUTHORS fileKarel Zak2016-10-071-1/+1
| | | | | Addresses: https://github.com/karelzak/util-linux/commit/b86db3c7cff489b8ce4cf9fc58176a78a1797bdc#commitcomment-19326504 Signed-off-by: Karel Zak <kzak@redhat.com>
* losetup --nooverlap: fix typoStanislav Brabec2016-10-061-1/+1
| | | | | | | | Option is documented and used as --nooverlap, bud coded as --nooverlaps. --nooverlap is considered as shortened option, making the typo invisible. Signed-off-by: Stanislav Brabec <sbrabec@suse.cz>
* rev: Avoid out of boundary readTobias Stoeckmann2016-10-061-0/+3
| | | | | Check if the length of the parsed string is at least 1, otherwise an out of boundary read would occur.
* rev: Avoid calling free in a signal handlerTobias Stoeckmann2016-10-061-1/+0Star
| | | | | | free() is not a safe function for a signal handler. The next line calls _exit() anyway, so there is no need for resource management.
* libblkid: Avoid strlen if only first char is checkedTobias Stoeckmann2016-10-066-6/+6
| | | | | | | | | | A strlen() call can lead to out of boundary read access if the superblock in question has no nul-bytes after the string. This could be avoided by using strnlen() but the calls in question merely existed to check if the string length is not 0. By changing the calls as proposed with this diff, these files are in sync with other superblock files, which do exactly the same.
* docs: update infor about TIOCSTIKarel Zak2016-10-062-2/+13
| | | | Signed-off-by: Karel Zak <kzak@redhat.com>
* Merge branch 'master' of https://github.com/Zeuh/util-linuxKarel Zak2016-10-051-1/+1
|\
| * Fix: list all block device from /dev and all symbolic links to block devicesRichard Yann2016-10-041-1/+1
| | | | | | | | Before fix "fsck -y /d<tab>" will never show LVM VG from multipath or mapped devices
* | wdct: mark usage() as noreturn [coverity scan]Karel Zak2016-10-051-1/+1
| |
* | swapoff: fix mem leak [coverity scan]Karel Zak2016-10-051-1/+4
| |
* | setarch: let's keep analyzer happy [coverity scan]Karel Zak2016-10-051-0/+1
| |
* | rtcwake: make sure buffer is zero terminated [coverity scan]Karel Zak2016-10-051-1/+1
| |
* | lsns: fix mem leak [coverity scan]Karel Zak2016-10-051-1/+1
| |
* | findmnt: (verify) fix mem leak [coverity scan]Karel Zak2016-10-051-5/+6
| |
* | isosize: fix read() result checkKarel Zak2016-10-041-1/+1
| |
* | libmount: fix null-checking [coverity scan]Karel Zak2016-10-041-1/+1
| | | | | | | | Signed-off-by: Karel Zak <kzak@redhat.com>
* | libblkid: check blkid_parse_tag_string() return code [coverity scan]Karel Zak2016-10-042-4/+2Star
| | | | | | | | Signed-off-by: Karel Zak <kzak@redhat.com>
* | lib/randutils: remove unnecessary functionKarel Zak2016-10-042-10/+3Star
| | | | | | | | Signed-off-by: Karel Zak <kzak@redhat.com>
* | lib/mbsalign: free buffer after error [coverity scan]Karel Zak2016-10-041-5/+6
| | | | | | | | Signed-off-by: Karel Zak <kzak@redhat.com>
* | sfdisk: cleanup before going out of scope [coverity scan]Karel Zak2016-10-041-5/+12
| | | | | | | | Signed-off-by: Karel Zak <kzak@redhat.com>
* | sfdisk: free before going out of scope [coverity scan]Karel Zak2016-10-041-0/+2
| | | | | | | | Signed-off-by: Karel Zak <kzak@redhat.com>
* | isosize: don't ignore read() result [coverity scan]Karel Zak2016-10-041-1/+1
| | | | | | | | Signed-off-by: Karel Zak <kzak@redhat.com>
* | fsck.cramfs: don't ignore read() result [coverity scan]Karel Zak2016-10-041-1/+1
| | | | | | | | Signed-off-by: Karel Zak <kzak@redhat.com>
* | tests: (cramfs) check for test_sysinfoKarel Zak2016-10-041-0/+1
| | | | | | | | Signed-off-by: Karel Zak <kzak@redhat.com>
* | cfdisk: fix mountpoint detectionKarel Zak2016-10-041-21/+26
|/ | | | Signed-off-by: Karel Zak <kzak@redhat.com>
* Revert "su,runuser: add libseccomp based workaround for TIOCSTI ioctl"Karel Zak2016-10-033-40/+3Star
| | | | | | This reverts commit 8e4925016875c6a4f2ab4f833ba66f0fc57396a2. Stupid hack...
* tests: add chrt vs. nice testKarel Zak2016-10-032-0/+64
| | | | Signed-off-by: Karel Zak <kzak@redhat.com>
* chrt: follow nice setting, prefer sched_setscheduler()Karel Zak2016-10-031-16/+18
| | | | | | | | | | | | | | | | * do not reset 'nice' setting by sched_setattr(), if 'nice' setting is not zero then chrt ends with EPERM for non-root users: $ renice -n 5 -p $$; chrt -v -b 0 date 12475 (process ID) old priority 0, new priority 5 chrt: failed to set pid 0's policy: Operation not permitted * it seems more elegant to always use old sched_setscheduler() API for non-deadline policies; in this case we do not need getpriority() to keep 'nice' unchanged. Addresses: https://github.com/karelzak/util-linux/issues/359 Signed-off-by: Karel Zak <kzak@redhat.com>
* tools: make ko-release-gen usable with gpg2Karel Zak2016-10-011-1/+2
| | | | Signed-off-by: Karel Zak <kzak@redhat.com>
* build-sys: release++ (v2.29-rc1)Karel Zak2016-09-302-1/+5
| | | | Signed-off-by: Karel Zak <kzak@redhat.com>
* docs: update v2.29-ReleaseNotesKarel Zak2016-09-301-0/+485
| | | | Signed-off-by: Karel Zak <kzak@redhat.com>
* docs: update AUTHORS fileKarel Zak2016-09-301-1/+17
| | | | Signed-off-by: Karel Zak <kzak@redhat.com>
* po: merge changesKarel Zak2016-09-3027-19051/+25266
| | | | Signed-off-by: Karel Zak <kzak@redhat.com>
* libsmartcols: add scols_column_add_width()Karel Zak2016-09-304-0/+23
| | | | Signed-off-by: Karel Zak <kzak@redhat.com>
* po: update sv.po (from translationproject.org)Sebastian Rasmussen2016-09-301-5808/+5136Star
|
* po: update pl.po (from translationproject.org)Jakub Bogusz2016-09-301-2257/+2026Star
|
* po: update nl.po (from translationproject.org)Benno Schulenberg2016-09-301-2417/+2158Star
|
* po: update ja.po (from translationproject.org)Takeshi Hamasaki2016-09-301-2263/+2464
|
* po: update es.po (from translationproject.org)Antonio Ceballos Roa2016-09-301-2258/+2029Star
|
* po: update de.po (from translationproject.org)Philipp Thomas2016-09-301-2258/+2026Star
|
* po: update cs.po (from translationproject.org)Petr Písař2016-09-301-2259/+2033Star
|
* findmnt: remove duplicate includeKarel Zak2016-09-301-1/+0Star
| | | | Signed-off-by: Karel Zak <kzak@redhat.com>
* tests: update build-sys testsKarel Zak2016-09-3018-50/+36Star
| | | | Signed-off-by: Karel Zak <kzak@redhat.com>
* su,runuser: add libseccomp based workaround for TIOCSTI ioctlKarel Zak2016-09-293-3/+40
| | | | | | | | | | | This patch add libseccomp based syscalls filter to disable TIOCSTI ioctl in su/runuser children. IMHO it is not elegant solution due to dependence on libseccomp (--without-seccomp if hate it)... but there is nothing better for now. Addresses: CVE-2016-2779 Signed-off-by: Karel Zak <kzak@redhat.com>
* tests: Add helper for TIOCSTI exploitStanislav Brabec2016-09-293-0/+32
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This helper/exploit injects "id -u -n\n" to the vulnerable calling terminal. Use id -u -n to get a reproducible output of test cases based on it. What can happen: Nothing, no exploit: pty is not accessible, sedsid() disconnected the task from pty, TIOCSTI failed. The command is injected to the unprivileged environment pty, and you see e. g. "nobody": This is acceptable. The command is injected to the caller (privileged) pty, and you see "root" (or caller uid name): This is not acceptable and has security implications. References: CVE-2016-2779 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-2779 http://seclists.org/oss-sec/2016/q1/448 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922 https://bugzilla.redhat.com/show_bug.cgi?id=173008 https://bugzilla.suse.com/show_bug.cgi?id=968674 https://bugzilla.suse.com/show_bug.cgi?id=968675 CVE-2016-2781 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-2781 http://seclists.org/oss-sec/2016/q1/452 Signed-off-by: Stanislav Brabec <sbrabec@suse.cz> Cc: Federico Bento <up201407890@alunos.dcc.fc.up.pt>
* libmount: paranoid change in mnt_table_is_fs_mounted()Karel Zak2016-09-291-1/+3
| | | | Signed-off-by: Karel Zak <kzak@redhat.com>