Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Call setsid() before executing sandboxed code (CVE-2017-5226)
This prevents the sandboxed code from getting a controlling tty, which in turn prevents it from accessing the TIOCSTI ioctl and hence faking terminal input. Fixes: containers#142
- Loading branch information