[Top][All Lists]
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Qemu-devel] [RFC PATCH] virtio-9p: Use clone approach to fix TOCTOU
From: |
M. Mohan Kumar |
Subject: |
Re: [Qemu-devel] [RFC PATCH] virtio-9p: Use clone approach to fix TOCTOU vulnerability |
Date: |
Thu, 16 Jun 2011 16:58:44 +0530 |
User-agent: |
Mutt/1.5.19 (2009-01-05) |
On Wed, Jun 15, 2011 at 04:24:12PM +0100, Stefan Hajnoczi wrote:
> On Tue, Jun 14, 2011 at 9:12 AM, M. Mohan Kumar <address@hidden> wrote:
> > [RFC PATCH] virtio-9p: Use clone approach to fix TOCTOU vulnerability
> >
> > In passthrough security model, following a symbolic link in the server
> > side could result in TOCTTOU vulnerability.
> >
> > Use clone system call to create a thread which runs in chrooted
> > environment. All passthrough model file operations are done from this
> > thread to avoid TOCTTOU vulnerability.
> >
> > Signed-off-by: Venkateswararao Jujjuri <address@hidden>
> > Signed-off-by: M. Mohan Kumar <address@hidden>
> > ---
> > fsdev/file-op-9p.h | 1 +
> > hw/9pfs/virtio-9p-coth.c | 105
> > +++++++++++++++++++++++++++++++++++++++++--
> > hw/9pfs/virtio-9p-coth.h | 13 +++++-
> > hw/9pfs/virtio-9p-device.c | 7 +++-
> > hw/9pfs/virtio-9p.h | 6 ++-
> > 5 files changed, 124 insertions(+), 8 deletions(-)
>
> This patch isn't against upstream virtio-9p. Please post a link to a
> repo or more information.
Hi Stefan,
Thanks for the detailed review. I will address review comments in next
version.