On Wed, Jun 15, 2011 at 04:24:12PM +0100, Stefan Hajnoczi wrote:
> On Tue, Jun 14, 2011 at 9:12 AM, M. Mohan Kumar <mo...@in.ibm.com> wrote:
> > [RFC PATCH] virtio-9p: Use clone approach to fix TOCTOU vulnerability
> >
> > In passthrough security model, following a symbolic link in the server
> > side could result in TOCTTOU vulnerability.
> >
> > Use clone system call to create a thread which runs in chrooted
> > environment. All passthrough model file operations are done from this
> > thread to avoid TOCTTOU vulnerability.
> >
> > Signed-off-by: Venkateswararao Jujjuri <jv...@linux.vnet.ibm.com>
> > Signed-off-by: M. Mohan Kumar <mo...@in.ibm.com>
> > ---
> >  fsdev/file-op-9p.h         |    1 +
> >  hw/9pfs/virtio-9p-coth.c   |  105 
> > +++++++++++++++++++++++++++++++++++++++++--
> >  hw/9pfs/virtio-9p-coth.h   |   13 +++++-
> >  hw/9pfs/virtio-9p-device.c |    7 +++-
> >  hw/9pfs/virtio-9p.h        |    6 ++-
> >  5 files changed, 124 insertions(+), 8 deletions(-)
> 
> This patch isn't against upstream virtio-9p.  Please post a link to a
> repo or more information.

Hi Stefan,
Thanks for the detailed review. I will address review comments in next
version.

Reply via email to