Ubuntu patch prevents custom argv[0]
| Affects | Status | Importance | Assigned to | Milestone | |
|---|---|---|---|---|---|
| rust-coreutils (Ubuntu) |
Confirmed
|
Undecided
|
Unassigned | ||
Bug Description
On Ubuntu 24.04.03 starting e.g. `true` with a custom argv[0] works:
```
ecordonnier@
/usr/lib/
foobar 0.0.24 (multi-call binary)
Usage: foobar [function [arguments...]]
Currently defined functions:
[, arch, b2sum, b3sum, base32, base64, basename, basenc, cat,
chcon, chgrp, chmod, chown,
chroot, cksum, comm, cp, csplit, cut, date, dd, df, dir,
dircolors, dirname, du, echo,
...
...
```
On Ubuntu 26.04 (development branch) it doesn't work:
```
asteba@
/usr/lib/
asteba@
Security violation: Requested utility `foobar` does not match executable name:
/usr/
```
It works with GNU coreutils however:
```
asteba@
asteba@
```
The error "Security Violation..." comes from a Ubuntu patch ( https:/
```
asteba@
./rust-
27:+ "Security violation: Requested utility `{}` does not match executable name:\n {}",
./rust-
116: "Security violation: Requested utility `{}` does not match executable name:\n {}",
```
@julian-klode FYI

Status changed to 'Confirmed' because the bug affects multiple users.