Do not follow symlinks when binding a unix domain socket.

This fixes the ssh 1.2.27 vulnerability as reported in bugtraq.
This commit is contained in:
Guido van Rooij 1999-09-29 21:09:41 +00:00
parent 7256d29cc4
commit 974784e8b4

View File

@ -548,7 +548,7 @@ unp_bind(unp, nam, p)
return EINVAL;
strncpy(buf, soun->sun_path, namelen);
buf[namelen] = 0; /* null-terminate the string */
NDINIT(&nd, CREATE, FOLLOW | LOCKPARENT, UIO_SYSSPACE,
NDINIT(&nd, CREATE, NOFOLLOW | LOCKPARENT, UIO_SYSSPACE,
buf, p);
/* SHOULD BE ABLE TO ADOPT EXISTING AND wakeup() ALA FIFO's */
error = namei(&nd);