linux/fs/overlayfs
Richard Weinberger 6a45b3628c ovl: Fix info leak in ovl_lookup_temp()
The function uses the memory address of a struct dentry as unique id.
While the address-based directory entry is only visible to root it is IMHO
still worth fixing since the temporary name does not have to be a kernel
address.  It can be any unique number.  Replace it by an atomic integer
which is allowed to wrap around.

Signed-off-by: Richard Weinberger <richard@nod.at>
Reviewed-by: Kees Cook <keescook@chromium.org>
Signed-off-by: Miklos Szeredi <mszeredi@redhat.com>
Cc: <stable@vger.kernel.org> # v3.18+
Fixes: e9be9d5e76 ("overlay filesystem")
2016-09-21 16:37:07 +02:00
..
copy_up.c ovl: during copy up, switch to mounter's creds early 2016-09-19 16:50:59 +02:00
dir.c ovl: Fix info leak in ovl_lookup_temp() 2016-09-21 16:37:07 +02:00
inode.c ovl: during copy up, switch to mounter's creds early 2016-09-19 16:50:59 +02:00
Kconfig ovl: rename filesystem type to "overlay" 2014-11-20 16:39:59 +01:00
Makefile ovl: rename filesystem type to "overlay" 2014-11-20 16:39:59 +01:00
overlayfs.h ovl: Switch to generic_getxattr 2016-09-01 11:12:00 +02:00
readdir.c ovl: proper cleanup of workdir 2016-09-01 11:11:59 +02:00
super.c ovl: lookup: do getxattr with mounter's permission 2016-09-16 14:12:11 +02:00