aboutsummaryrefslogtreecommitdiffstats
path: root/scripts/qapi-commands.py
diff options
context:
space:
mode:
authorGreg Kurz <groug@kaod.org>2017-02-26 23:43:48 +0100
committerGreg Kurz <groug@kaod.org>2017-02-28 11:21:15 +0100
commitf9aef99b3e6df88036436b0d3dc3d504b9346c8c (patch)
tree6ad06946fcda9024f65bd1fa08c5702ece04d242 /scripts/qapi-commands.py
parent9pfs: local: readlink: don't follow symlinks (diff)
downloadqemu-f9aef99b3e6df88036436b0d3dc3d504b9346c8c.tar.xz
qemu-f9aef99b3e6df88036436b0d3dc3d504b9346c8c.zip
9pfs: local: lstat: don't follow symlinks
The local_lstat() callback is vulnerable to symlink attacks because it calls: (1) lstat() which follows symbolic links in all path elements but the rightmost one (2) getxattr() which follows symbolic links in all path elements (3) local_mapped_file_attr()->local_fopen()->openat(O_NOFOLLOW) which follows symbolic links in all path elements but the rightmost one This patch converts local_lstat() to rely on opendir_nofollow() and fstatat(AT_SYMLINK_NOFOLLOW) to fix (1), fgetxattrat_nofollow() to fix (2). A new local_fopenat() helper is introduced as a replacement to local_fopen() to fix (3). No effort is made to factor out code because local_fopen() will be dropped when all users have been converted to call local_fopenat(). This partly fixes CVE-2016-9602. Signed-off-by: Greg Kurz <groug@kaod.org> Reviewed-by: Stefan Hajnoczi <stefanha@redhat.com>
Diffstat (limited to 'scripts/qapi-commands.py')
0 files changed, 0 insertions, 0 deletions