• G
    9pfs: local: lsetxattr: don't follow symlinks · 3e36aba7
    Greg Kurz 提交于
    The local_lsetxattr() callback is vulnerable to symlink attacks because
    it calls lsetxattr() which follows symbolic links in all path elements but
    the rightmost one.
    
    This patch introduces a helper to emulate the non-existing fsetxattrat()
    function: it is implemented with /proc/self/fd which provides a trusted
    path that can be safely passed to lsetxattr().
    
    local_lsetxattr() is converted to use this helper and opendir_nofollow().
    
    This partly fixes CVE-2016-9602.
    Signed-off-by: NGreg Kurz <groug@kaod.org>
    Reviewed-by: NStefan Hajnoczi <stefanha@redhat.com>
    3e36aba7
9p-util.h 1.3 KB