On Mon, Feb 20, 2017 at 03:40:45PM +0100, Greg Kurz wrote: > The local_lremovexattr() callback is vulnerable to symlink attacks because > it calls lremovexattr() which follows symbolic links in all path elements but > the rightmost one. > > This patch converts local_lremovexattr() to rely on opendir_nofollow() and > fremovexattrat_nofollow() instead. > > This partly fixes CVE-2016-9602. > > Signed-off-by: Greg Kurz <gr...@kaod.org> > --- > hw/9pfs/9p-posix-acl.c | 10 ++-------- > hw/9pfs/9p-xattr-user.c | 8 +------- > hw/9pfs/9p-xattr.c | 8 +------- > 3 files changed, 4 insertions(+), 22 deletions(-)
Reviewed-by: Stefan Hajnoczi <stefa...@redhat.com>
signature.asc
Description: PGP signature