2010-12-23 11:08:49 +01:00
|
|
|
#!/bin/bash
|
|
|
|
export QT_NO_KDE_INTEGRATION=1
|
2017-06-09 00:26:55 +02:00
|
|
|
# make certain that the user/group combination is valid
|
2010-12-23 11:08:49 +01:00
|
|
|
/usr/bin/id -nG | grep -v -e "root" -e "vboxusers" >/dev/null && /usr/lib/virtualbox/VBoxPermissionMessage && exit
|
2017-06-09 00:26:55 +02:00
|
|
|
#
|
|
|
|
# Handle the issue regarding USB passthru
|
|
|
|
# The following conditions apply:
|
|
|
|
# 1. If ~/.vbox/enable exists, the user accepts the security risk.
|
2019-04-05 16:49:14 +02:00
|
|
|
# 2. If ~/.vbox/disable exists, the user does not accept the risk. That file will contain the inode of /usr/lib/udev/rules.d/60-vboxdrv.rules.
|
2017-06-09 00:26:55 +02:00
|
|
|
# When that changes, the VBoxUSB_DevRules will again be displayed as that means that VB has been reloaded.
|
|
|
|
#
|
|
|
|
devrules()
|
|
|
|
{
|
2017-01-14 03:16:29 +01:00
|
|
|
/usr/lib/virtualbox/VBoxUSB_DevRules
|
2017-06-09 00:26:55 +02:00
|
|
|
if [ $? -eq 0 ] ; then
|
|
|
|
# User accepts the risk
|
|
|
|
touch ~/.vbox/enable
|
|
|
|
rm -f ~/.vbox/disable
|
|
|
|
else
|
|
|
|
# User declines the risk - save the inode
|
|
|
|
echo "" > ~/.vbox/disable
|
|
|
|
rm -f ~/.vbox/enable
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
# Start of main routine
|
|
|
|
#
|
|
|
|
# Ensure that ~/.vbox exists
|
|
|
|
mkdir -p ~/.vbox/
|
2019-04-05 16:49:14 +02:00
|
|
|
# Get the inode for /usr/lib/udev/rules.d/60-vboxdrv.rules
|
|
|
|
INODE=$(stat /usr/lib/udev/rules.d/60-vboxdrv.rules | grep Inode | cut -d' ' -f3)
|
2017-06-09 00:26:55 +02:00
|
|
|
if [ ! -f ~/.vbox/enable ] && [ ! -f ~/.vbox/disable ] ; then
|
|
|
|
# Neither file exists - find what the user wants
|
|
|
|
devrules
|
2017-01-14 03:16:29 +01:00
|
|
|
fi
|
2017-06-09 00:26:55 +02:00
|
|
|
# Get the original Inode if it exists
|
|
|
|
if [ -f ~/.vbox/disable ] ; then
|
|
|
|
read LINE < ~/.vbox/disable
|
|
|
|
else
|
|
|
|
LINE=" "
|
|
|
|
fi
|
2019-04-05 16:49:14 +02:00
|
|
|
# If user originally declined, make certain that /usr/lib/udev/rules.d/60-vboxdrv.rules has not been changed
|
2017-06-09 00:26:55 +02:00
|
|
|
if [ -f ~/.vbox/disable ] && [ "$LINE" != "$INODE" ] && [ "$LINE" != "" ] ; then
|
|
|
|
# disable is selected and the Inode has changed - ask again
|
|
|
|
devrules
|
|
|
|
fi
|
|
|
|
if [ -f ~/.vbox/disable ] ; then
|
|
|
|
echo $INODE > ~/.vbox/disable
|
|
|
|
if [ "$LINE" != "$INODE" ] ; then
|
|
|
|
if [ -f /usr/bin/kdesu ] ; then
|
|
|
|
kdesu /sbin/vbox-fix-usb-rules.sh
|
|
|
|
fi
|
|
|
|
if [ -f /usr/bin/gnomesu ] ; then
|
|
|
|
gnomesu /sbin/vbox-fix-usb-rules.sh
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
fi
|
Accepting request 696073 from home:lwfinger:branches:openSUSE:Factory
- Updated file "Fixes_for_Leap15.1.patch" to handle one addition problem due to backporting of kernel APIa.
Remove "BuildRequires: quilt" - that package is not needed.
VirtualBox 6.0.6 fixes the following: CVE-2019-2656, CVE-2019-2680, CVE-2019-2696, CVE-2019-2703, CVE-2019-2721,
CVE-2019-2722, CVE-2019-2723, CVE-2019-2657, CVE-2019-2690, CVE-2019-2679,
CVE-2019-2678, and CVE-2019-2574 boo#1132827.
- Version bump to 6.0.6 (released April 17 2019 by Oracle)
The following files in the openSUSE implemetation are removed: "fix_32_bit_builds.patch", "fixes_for_5.0.patch", and
"fixes_for_5.1.patch". These issues are fixed upstream.
OBS-URL: https://build.opensuse.org/request/show/696073
OBS-URL: https://build.opensuse.org/package/show/Virtualization/virtualbox?expand=0&rev=486
2019-04-30 02:56:27 +02:00
|
|
|
# Check that /usr/lib/virtualbox/VirtualBoxVM has SUID permissions
|
|
|
|
PERM=$(ls -l /usr/lib/virtualbox/VirtualBoxVM | grep rwsr)
|
|
|
|
if [ -z "$PERM" ]
|
|
|
|
then
|
|
|
|
logger -s "Wrong permissions for VirtualBoxVM - use 'sudo chmod 4711 /usr/lib/virtualbox/VirtualBoxVM' to fix"
|
|
|
|
/usr/lib/virtualbox/VBoxSUIDMessage
|
|
|
|
exit 1
|
|
|
|
fi
|
2017-06-09 00:26:55 +02:00
|
|
|
# Now run the VB GUI
|
2019-01-28 21:37:13 +01:00
|
|
|
LD_LIBRARY_PATH="/usr/lib/virtualbox${LD_LIBRARY_PATH:+:$LD_LIBRARY_PATH}" /usr/lib/virtualbox/VirtualBox6 $@
|