summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorMike Pagano <mpagano@gentoo.org>2018-12-01 12:25:28 -0500
committerMike Pagano <mpagano@gentoo.org>2018-12-01 12:25:28 -0500
commit42ae3826b066f3d7b311438ce2d51b3a2f1ee42c (patch)
tree3a516b55dda2dd0dd5cd2ab86e75a38961ba71d4
parentproj/linux-patches: Linux patch 4.14.85 (diff)
downloadlinux-patches-42ae3826b066f3d7b311438ce2d51b3a2f1ee42c.tar.gz
linux-patches-42ae3826b066f3d7b311438ce2d51b3a2f1ee42c.tar.bz2
linux-patches-42ae3826b066f3d7b311438ce2d51b3a2f1ee42c.zip
proj/linux-patches: Update existing patch for 4.14.854.14-92
Patch updated: 1510_fs-enable-link-security-restrictions-by-default.patch Signed-off-by: Mike Pagano <mpagano@gentoo.org>
-rw-r--r--1510_fs-enable-link-security-restrictions-by-default.patch21
1 files changed, 6 insertions, 15 deletions
diff --git a/1510_fs-enable-link-security-restrictions-by-default.patch b/1510_fs-enable-link-security-restrictions-by-default.patch
index 639fb3c3..8bfb36c1 100644
--- a/1510_fs-enable-link-security-restrictions-by-default.patch
+++ b/1510_fs-enable-link-security-restrictions-by-default.patch
@@ -1,22 +1,13 @@
-From: Ben Hutchings <ben@decadent.org.uk>
-Subject: fs: Enable link security restrictions by default
-Date: Fri, 02 Nov 2012 05:32:06 +0000
-Bug-Debian: https://bugs.debian.org/609455
-Forwarded: not-needed
-
-This reverts commit 561ec64ae67ef25cac8d72bb9c4bfc955edfd415
-('VFS: don't do protected {sym,hard}links by default').
-
---- a/fs/namei.c
-+++ b/fs/namei.c
-@@ -651,8 +651,8 @@ static inline void put_link(struct namei
- path_put(link);
+--- a/fs/namei.c 2018-12-01 11:30:07.672594412 -0500
++++ b/fs/namei.c 2018-12-01 11:30:58.772816410 -0500
+@@ -902,8 +902,8 @@ static inline void put_link(struct namei
+ path_put(&last->link);
}
-int sysctl_protected_symlinks __read_mostly = 0;
-int sysctl_protected_hardlinks __read_mostly = 0;
+int sysctl_protected_symlinks __read_mostly = 1;
+int sysctl_protected_hardlinks __read_mostly = 1;
+ int sysctl_protected_fifos __read_mostly;
+ int sysctl_protected_regular __read_mostly;
- /**
- * may_follow_link - Check symlink following for unsafe situations