Go to file
Marek Marczykowski-Górecki efc7d4d1f2 filecopy: prevent files/dirs movement outside incoming directory during transfer
Otherwise, when the user moves directory, which is still in transfer,
somewhere else, it could allow malicious source domain to escape chroot
and place a file in arbitrary location.

It looks like bind mount is just enough - simple rename fails with
EXDEV, so tools are forced to perform copy+delete, which is enough to
keep unpacker process away from new file location.

One inconvenient detail is that we must clean the mount after transfer
finishes, so root perms cannot be dropped completely. We keep separate
process for only that reason.
2015-01-30 00:45:04 +01:00
archlinux fc21: iptables configurations conflict with fc21 yum package manager 2015-01-30 00:43:31 +01:00
debian fc21: iptables configurations conflict with fc21 yum package manager 2015-01-30 00:43:31 +01:00
doc Fix formating 2014-05-25 00:55:51 +02:00
misc fedora: Add security-testing repo definition 2015-01-30 00:45:02 +01:00
network network: fix NM config preparation 2015-01-30 00:43:29 +01:00
pkgs archlinux: created build scripts 2013-04-17 01:22:32 +02:00
qrexec qrexec: register exec function 2014-11-19 15:34:34 +01:00
qubes-rpc filecopy: prevent files/dirs movement outside incoming directory during transfer 2015-01-30 00:45:04 +01:00
rpm_spec fc21: iptables configurations conflict with fc21 yum package manager 2015-01-30 00:43:31 +01:00
vm-init.d Fix disabling nm-applet when NM is disabled 2015-01-30 00:32:09 +01:00
vm-systemd Fix disabling nm-applet when NM is disabled 2015-01-30 00:32:09 +01:00
.gitignore gitignore: fix binary packages declaration 2014-07-27 06:11:14 +02:00
LICENSE Added LICENSE 2010-04-05 21:21:27 +02:00
Makefile fc21: Remove left-over code comment 2015-01-30 00:43:31 +01:00
Makefile.builder Initial debian packaging 2014-07-23 05:13:32 +02:00
version version 3.0.0 2014-11-22 16:24:18 +01:00