diff options
| author | Sebastian Lackner | 2017-12-11 03:56:31 +0100 | 
|---|---|---|
| committer | rfjakob | 2017-12-11 09:55:16 +0100 | 
| commit | 96dc2ca70906c831b60be1c6ed3a27dbf7628e72 (patch) | |
| tree | 5fdbe793f504f65a5f14ebba12ca603139e28b18 | |
| parent | 3af51736f3f19659d723f60aa480578fae2cddbc (diff) | |
fusefrontend_reverse: Reject access to device nodes in newFile function
Steps to reproduce:
* Create a regular reverse mount point
* Create a file "test" in the original directory
* Access the corresponding encrypted directory in the mount point (ls <encrypted dir>)
* Quickly delete the file in the original data - instead create a device node
* Access the file again, it will access the device node and attempt to read from it
Fixes https://github.com/rfjakob/gocryptfs/issues/187
| -rw-r--r-- | internal/fusefrontend_reverse/rfile.go | 8 | 
1 files changed, 8 insertions, 0 deletions
| diff --git a/internal/fusefrontend_reverse/rfile.go b/internal/fusefrontend_reverse/rfile.go index c10d341..26756a3 100644 --- a/internal/fusefrontend_reverse/rfile.go +++ b/internal/fusefrontend_reverse/rfile.go @@ -51,6 +51,14 @@ func (rfs *ReverseFS) newFile(relPath string) (*reverseFile, fuse.Status) {  		syscall.Close(fd)  		return nil, fuse.ToStatus(err)  	} +	// Reject access if the file descriptor does not refer to a regular file. +	var a fuse.Attr +	a.FromStat(&st) +	if !a.IsRegular() { +		tlog.Warn.Printf("ino%d: newFile: not a regular file", st.Ino) +		syscall.Close(fd) +		return nil, fuse.ToStatus(syscall.EACCES) +	}  	// See if we have that inode number already in the table  	// (even if Nlink has dropped to 1)  	var derivedIVs pathiv.FileIVs | 
