• G
    9pfs: local: llistxattr: don't follow symlinks · 5507904e
    Greg Kurz 提交于
    The local_llistxattr() callback is vulnerable to symlink attacks because
    it calls llistxattr() which follows symbolic links in all path elements but
    the rightmost one.
    
    This patch introduces a helper to emulate the non-existing flistxattrat()
    function: it is implemented with /proc/self/fd which provides a trusted
    path that can be safely passed to llistxattr().
    
    local_llistxattr() is converted to use this helper and opendir_nofollow().
    
    This partly fixes CVE-2016-9602.
    Signed-off-by: NGreg Kurz <groug@kaod.org>
    Reviewed-by: NStefan Hajnoczi <stefanha@redhat.com>
    5507904e
9p-xattr.c 6.3 KB