Do not follow symlinks when binding a unix domain socket.
This fixes the ssh 1.2.27 vulnerability as reported in bugtraq.
This commit is contained in:
parent
7256d29cc4
commit
974784e8b4
@ -548,7 +548,7 @@ unp_bind(unp, nam, p)
|
||||
return EINVAL;
|
||||
strncpy(buf, soun->sun_path, namelen);
|
||||
buf[namelen] = 0; /* null-terminate the string */
|
||||
NDINIT(&nd, CREATE, FOLLOW | LOCKPARENT, UIO_SYSSPACE,
|
||||
NDINIT(&nd, CREATE, NOFOLLOW | LOCKPARENT, UIO_SYSSPACE,
|
||||
buf, p);
|
||||
/* SHOULD BE ABLE TO ADOPT EXISTING AND wakeup() ALA FIFO's */
|
||||
error = namei(&nd);
|
||||
|
Loading…
Reference in New Issue
Block a user