aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorEd Maste <emaste@FreeBSD.org>2022-01-28 22:15:02 +0000
committerEd Maste <emaste@FreeBSD.org>2022-02-05 16:26:14 +0000
commit647d3bf17cd907ded624dccf4fe4567924c4f399 (patch)
treedcde81a455a6c703319bd1468ec47aad00b8bb82
parent4fa8cb965e73421df00ac5c724aa27b8a117fc32 (diff)
downloadsrc-647d3bf17cd907ded624dccf4fe4567924c4f399.tar.gz
src-647d3bf17cd907ded624dccf4fe4567924c4f399.zip
dma: exit if invoked with invalid (zero) argc
This was prompted by the recent pkexec vulnerability (CVE-2021-4034). This change is being made on general principle for setuid/setgid binaries and is not in response to an actual issue. Reviewed by: kevans, markj (both earlier) MFC after: 1 week Sponsored by: The FreeBSD Foundation Differential Revision: https://reviews.freebsd.org/D34087 (cherry picked from commit 1c91aedf25bce879a8aced6439200e46601eb8a4)
-rw-r--r--contrib/dma/dma.c3
1 files changed, 3 insertions, 0 deletions
diff --git a/contrib/dma/dma.c b/contrib/dma/dma.c
index 72115ae2b55e..7cad25a214ee 100644
--- a/contrib/dma/dma.c
+++ b/contrib/dma/dma.c
@@ -428,6 +428,9 @@ main(int argc, char **argv)
int nodot = 0, showq = 0, queue_only = 0, newaliases = 0;
int recp_from_header = 0;
+ if (argc == 0)
+ errx(EX_OSERR, "invalid argc");
+
set_username();
/*