fixed symlink race condition in sender
authorAndrew Tridgell <andrew@tridgell.net>
Tue, 17 Dec 2024 21:59:42 +0000 (08:59 +1100)
committerAndrew Tridgell <andrew@tridgell.net>
Tue, 14 Jan 2025 18:30:32 +0000 (05:30 +1100)
commit0590b09d9a34ae72741b91ec0708a820650198b0
tree03171c1629ad146d0ce22e1389252e3eb968f363
parent407c71c7ce562137230e8ba19149c81ccc47c387
fixed symlink race condition in sender

when we open a file that we don't expect to be a symlink use
O_NOFOLLOW to prevent a race condition where an attacker could change
a file between being a normal file and a symlink
checksum.c
flist.c
generator.c
receiver.c
sender.c
syscall.c
t_unsafe.c
tls.c
trimslash.c
util1.c