| /OK3568_Linux_fs/yocto/meta-openembedded/meta-networking/recipes-daemons/squid/files/ |
| H A D | 0001-tools.cc-fixed-unused-result-warning.patch | 8 | ../../squid-3.5.26/src/tools.cc:616:11: error: ignoring return value of 'int setuid(__uid_t)', de… 9 | setuid(0); 27 - setuid(0); 28 + if (setuid(0) < 0) { 30 + debugs(50, DBG_IMPORTANT, "WARNING: no_suid: setuid(0): " << xstrerr(xerrno));
|
| /OK3568_Linux_fs/kernel/Documentation/userspace-api/ |
| H A D | no_new_privs.rst | 6 its parent did not have. The most obvious examples are setuid/setgid 13 a program is setuid. 27 been done without the execve call. For example, the setuid and setgid 43 ``setuid(2)`` and receive SCM_RIGHTS datagrams. 55 escalate its privileges by directly attacking setuid, setgid, and
|
| /OK3568_Linux_fs/kernel/tools/testing/selftests/safesetid/ |
| H A D | safesetid-test.c | 216 if (setuid(child_uid) < 0) in test_setuid() 295 if (setuid(NO_POLICY_USER) < 0) in main() 312 if (setuid(RESTRICTED_PARENT) < 0) in main()
|
| /OK3568_Linux_fs/kernel/fs/devpts/ |
| H A D | inode.c | 94 int setuid; member 252 opts->setuid = 0; in parse_mount_options() 284 opts->setuid = 1; in parse_mount_options() 408 if (opts->setuid) in devpts_show_options() 579 inode->i_uid = opts->setuid ? opts->uid : current_fsuid(); in devpts_pty_new()
|
| /OK3568_Linux_fs/buildroot/package/shadow/ |
| H A D | Config.in | 20 bool "account-tools-setuid" 22 Install the user and group management tools setuid and authenticate the
|
| H A D | shadow.mk | 38 SHADOW_CONF_OPTS += --enable-account-tools-setuid 49 SHADOW_CONF_OPTS += --disable-account-tools-setuid
|
| /OK3568_Linux_fs/buildroot/package/polkit/ |
| H A D | 0002-Improve-meson_post_install-script.patch | 83 + 'Owner and mode of {} need to be setuid root (04755) after ' 105 # polkit-agent-helper-1 need to be setuid root because it's used to 117 + 'Owner and mode of {} need to be setuid root (04755) after '
|
| /OK3568_Linux_fs/buildroot/package/popt/ |
| H A D | 0005-fix-build-without-mbstate_t.patch | 39 -AC_CHECK_FUNCS([getuid geteuid iconv mtrace secure_getenv __secure_getenv setreuid setuid stpcpy s… 40 +AC_CHECK_FUNCS([getuid geteuid iconv mtrace secure_getenv __secure_getenv setreuid setuid stpcpy s…
|
| H A D | 0002-Detect-glob_pattern_p.patch | 36 -AC_CHECK_FUNCS(getuid geteuid iconv mtrace secure_getenv __secure_getenv setreuid setuid stpcpy st… 37 +AC_CHECK_FUNCS(getuid geteuid iconv mtrace secure_getenv __secure_getenv setreuid setuid stpcpy st…
|
| H A D | 0003-configure-replace-deprecated-macros.patch | 71 -AC_CHECK_FUNCS(getuid geteuid iconv mtrace secure_getenv __secure_getenv setreuid setuid stpcpy st… 73 +AC_CHECK_FUNCS([getuid geteuid iconv mtrace secure_getenv __secure_getenv setreuid setuid stpcpy s…
|
| /OK3568_Linux_fs/kernel/Documentation/admin-guide/LSM/ |
| H A D | SafeSetID.rst | 27 especially since programs often only call setuid() to drop privileges to a 30 switch to through setuid() beyond allowing a switch to any user on the system. 39 do any unapproved actions (e.g. setuid to uid 0 or create/enter new user 92 "Since setuid only affects the current process, and since the SELinux controls
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-networking/recipes-support/open-vm-tools/open-vm-tools/ |
| H A D | 0005-Use-configure-to-test-for-feature-instead-of-platfor.patch | 85 - * setuid or setgid. Alternatives include, 86 + * setuid or setgid, when issetugid or getauxval(AT_SECURE) is not
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-support/gosu/ |
| H A D | gosu_1.14.bb | 1 SUMMARY = "Simple Go-based setuid+setgid+setgroups+exec"
|
| /OK3568_Linux_fs/buildroot/package/openvmtools/ |
| H A D | 0007-Use-configure-to-test-for-feature-instead-of-platfor.patch | 85 - * setuid or setgid. Alternatives include, 86 + * setuid or setgid, when issetugid or getauxval(AT_SECURE) is not
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-graphics/xorg-app/ |
| H A D | xterm_372.bb | 25 --disable-setuid \
|
| /OK3568_Linux_fs/external/xserver/hw/xfree86/parser/ |
| H A D | write.c | 150 if (setuid(getuid()) == -1) in xf86writeConfigFile()
|
| /OK3568_Linux_fs/kernel/tools/testing/selftests/clone3/ |
| H A D | clone3_cap_checkpoint_restore.c | 171 ASSERT_EQ(setuid(65534), 0); in TEST()
|
| /OK3568_Linux_fs/external/xserver/debian/ |
| H A D | xserver-xorg-core.NEWS | 17 The Xorg server is no longer setuid root by default. This change reduces the
|
| /OK3568_Linux_fs/buildroot/package/makedevs/ |
| H A D | README | 11 and (assuming the file /sbin/foobar exists) it will be made setuid
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-connectivity/ppp/ppp/ |
| H A D | CVE-2022-4603.patch | 13 PPP connection, is not installed setuid-root, and is not invoked
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-support/atop/atop/ |
| H A D | fix-permissions.patch | 6 Update permissions of executable files that remove setuid bit and make
|
| /OK3568_Linux_fs/kernel/tools/testing/selftests/mount/ |
| H A D | nosymfollow-test.c | 108 if (setuid(0) != 0) in create_and_enter_ns()
|
| /OK3568_Linux_fs/buildroot/package/android-tools/ |
| H A D | 0002-Fix-adbd-for-non-Ubuntu-systems.patch | 125 - setuid(AID_SHELL); 173 - setuid(0);
|
| /OK3568_Linux_fs/kernel/tools/testing/selftests/net/ |
| H A D | ipv6_flowlabel_mgr.c | 136 if (setuid(USHRT_MAX)) in run_tests()
|
| /OK3568_Linux_fs/buildroot/package/lighttpd/ |
| H A D | 0001-Fix-default-config-file.patch | 5 * Do not setuid to a user that doesn't exist on the system
|