Jakob Unterwurzacher b22cc03c75 fusefrontend: -allow_other: set file mode *after* chown in Create()
Reported by @slackner at https://github.com/rfjakob/gocryptfs/issues/327 :

Possible race-conditions between file creation and Fchownat

* Assume a system contains a gocryptfs mount as root user
  with -allow_other
* As a regular user create a new file with mode containing
  the SUID flag and write access for other users
* Before gocryptfs executes the Fchownat call, try to open
  the file again, write some exploit code to it, and try to run it.

For a short time, the file is owned by root and has the SUID flag, so
this is pretty dangerous.
2019-01-08 21:50:10 +01:00
..
2018-04-02 18:32:30 +02:00
2018-10-11 20:16:45 +02:00
2017-05-31 08:21:36 +02:00
2017-04-29 14:50:58 +02:00
2017-04-29 14:50:58 +02:00
2018-12-27 15:19:55 +01:00