Avoid name change if script is called via symlink from execvp et al.

* spawn.cc (find_exec): Fix a name change in case of a symlink which
	can be opened as is.

Signed-off-by: Corinna Vinschen <vinschen@redhat.com>
This commit is contained in:
Corinna Vinschen 2015-03-17 11:40:12 +01:00
parent 44e5c14e08
commit 8f00fa7f36
No known key found for this signature in database
GPG Key ID: F536069DAE444FA0
3 changed files with 14 additions and 6 deletions

View File

@ -1,3 +1,8 @@
2015-03-17 Corinna Vinschen <corinna@vinschen.de>
* spawn.cc (find_exec): Fix a name change in case of a symlink which
can be opened as is.
2015-03-12 Jon TURNEY <jon.turney@dronecode.org.uk>
* exceptions.cc (stack_info): Add sigstackptr member.

View File

@ -15,3 +15,6 @@ Bug Fixes
- Fix potential premature SIGHUP in pty code.
Addresses: https://cygwin.com/ml/cygwin/2015-03/msg00070.html
- Fix a name change from symlink to target name in calls to execvp, system, etc.
Addresses: https://cygwin.com/ml/cygwin/2015-03/msg00270.html

View File

@ -103,14 +103,14 @@ find_exec (const char *name, path_conv& buf, const char *search,
/* Check to see if file can be opened as is first. */
if ((has_slash || opt & FE_CWD)
&& (suffix = perhaps_suffix (name, buf, err, opt)) != NULL)
{
if (!has_slash)
{
/* Overwrite potential symlink target with original path.
See comment preceeding this method. */
stpcpy (stpcpy (tmp, "./"), name);
tmp_path = tmp;
if (!has_slash)
tmp_path = stpcpy (tmp, "./");
stpcpy (tmp_path, name);
buf.set_posix (tmp);
}
retval = buf.get_posix ();
goto out;
}