mirror of
https://gitlab.freedesktop.org/pipewire/pipewire.git
synced 2026-04-30 06:46:49 -04:00
security: add missing O_CLOEXEC/SOCK_CLOEXEC flags
File and Resource Handling: Medium Several file and socket operations were missing the close-on-exec flag, which causes file descriptors to leak to child processes created via fork+exec. This could allow child processes unintended access to privileged resources. - node-driver.c: SOCK_DGRAM socket for SIOCETHTOOL ioctl leaked to child processes - pw-container.c: Unix domain listen socket leaked to spawned container processes - compress-offload-api.c: ALSA compress-offload device fd leaked to child processes Added O_CLOEXEC to open() calls and SOCK_CLOEXEC to socket() calls. Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
This commit is contained in:
parent
3b7e9b0779
commit
7bfa93de05
3 changed files with 3 additions and 3 deletions
|
|
@ -726,7 +726,7 @@ static int get_phc_index(struct spa_system *s, const char *name) {
|
|||
strncpy(ifr.ifr_name, name, IFNAMSIZ - 1);
|
||||
ifr.ifr_data = (char *) &info;
|
||||
|
||||
fd = socket(AF_INET, SOCK_DGRAM, 0);
|
||||
fd = socket(AF_INET, SOCK_DGRAM | SOCK_CLOEXEC, 0);
|
||||
if (fd < 0)
|
||||
return -errno;
|
||||
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue