diff options
author | Mike Pagano <mpagano@gentoo.org> | 2022-02-26 12:42:09 -0500 |
---|---|---|
committer | Mike Pagano <mpagano@gentoo.org> | 2022-02-26 12:42:09 -0500 |
commit | 9d5fa235c9c8eff2dc40d7d9640e7968219d4353 (patch) | |
tree | 233d3659f98b066391361c4add04b24413f0e706 | |
parent | Remove redundant patch (diff) | |
download | linux-patches-9d5fa235c9c8eff2dc40d7d9640e7968219d4353.tar.gz linux-patches-9d5fa235c9c8eff2dc40d7d9640e7968219d4353.tar.bz2 linux-patches-9d5fa235c9c8eff2dc40d7d9640e7968219d4353.zip |
Update default sec restrictions
Bug: https://bugs.gentoo.org/834085
Signed-off-by: Mike Pagano <mpagano@gentoo.org>
-rw-r--r-- | 1510_fs-enable-link-security-restrictions-by-default.patch | 21 |
1 files changed, 9 insertions, 12 deletions
diff --git a/1510_fs-enable-link-security-restrictions-by-default.patch b/1510_fs-enable-link-security-restrictions-by-default.patch index f0ed144f..1b3e590d 100644 --- a/1510_fs-enable-link-security-restrictions-by-default.patch +++ b/1510_fs-enable-link-security-restrictions-by-default.patch @@ -1,20 +1,17 @@ -From: Ben Hutchings <ben@decadent.org.uk> -Subject: fs: Enable link security restrictions by default -Date: Fri, 02 Nov 2012 05:32:06 +0000 -Bug-Debian: https://bugs.debian.org/609455 -Forwarded: not-needed -This reverts commit 561ec64ae67ef25cac8d72bb9c4bfc955edfd415 -('VFS: don't do protected {sym,hard}links by default'). ---- a/fs/namei.c 2018-09-28 07:56:07.770005006 -0400 -+++ b/fs/namei.c 2018-09-28 07:56:43.370349204 -0400 -@@ -885,8 +885,8 @@ static inline void put_link(struct namei +--- a/fs/namei.c 2022-01-09 17:55:34.000000000 -0500 ++++ b/fs/namei.c 2022-02-26 11:32:31.832844465 -0500 +@@ -1020,10 +1020,10 @@ static inline void put_link(struct namei path_put(&last->link); } -int sysctl_protected_symlinks __read_mostly = 0; -int sysctl_protected_hardlinks __read_mostly = 0; +-int sysctl_protected_fifos __read_mostly; +-int sysctl_protected_regular __read_mostly; +int sysctl_protected_symlinks __read_mostly = 1; +int sysctl_protected_hardlinks __read_mostly = 1; - int sysctl_protected_fifos __read_mostly; - int sysctl_protected_regular __read_mostly; ++int sysctl_protected_fifos __read_mostly = 1; ++int sysctl_protected_regular __read_mostly = 1; + /** + * may_follow_link - Check symlink following for unsafe situations |