diff options
author | Mike Pagano <mpagano@gentoo.org> | 2018-12-01 12:25:28 -0500 |
---|---|---|
committer | Mike Pagano <mpagano@gentoo.org> | 2018-12-01 12:25:28 -0500 |
commit | 42ae3826b066f3d7b311438ce2d51b3a2f1ee42c (patch) | |
tree | 3a516b55dda2dd0dd5cd2ab86e75a38961ba71d4 | |
parent | proj/linux-patches: Linux patch 4.14.85 (diff) | |
download | linux-patches-42ae3826b066f3d7b311438ce2d51b3a2f1ee42c.tar.gz linux-patches-42ae3826b066f3d7b311438ce2d51b3a2f1ee42c.tar.bz2 linux-patches-42ae3826b066f3d7b311438ce2d51b3a2f1ee42c.zip |
proj/linux-patches: Update existing patch for 4.14.854.14-92
Patch updated:
1510_fs-enable-link-security-restrictions-by-default.patch
Signed-off-by: Mike Pagano <mpagano@gentoo.org>
-rw-r--r-- | 1510_fs-enable-link-security-restrictions-by-default.patch | 21 |
1 files changed, 6 insertions, 15 deletions
diff --git a/1510_fs-enable-link-security-restrictions-by-default.patch b/1510_fs-enable-link-security-restrictions-by-default.patch index 639fb3c3..8bfb36c1 100644 --- a/1510_fs-enable-link-security-restrictions-by-default.patch +++ b/1510_fs-enable-link-security-restrictions-by-default.patch @@ -1,22 +1,13 @@ -From: Ben Hutchings <ben@decadent.org.uk> -Subject: fs: Enable link security restrictions by default -Date: Fri, 02 Nov 2012 05:32:06 +0000 -Bug-Debian: https://bugs.debian.org/609455 -Forwarded: not-needed - -This reverts commit 561ec64ae67ef25cac8d72bb9c4bfc955edfd415 -('VFS: don't do protected {sym,hard}links by default'). - ---- a/fs/namei.c -+++ b/fs/namei.c -@@ -651,8 +651,8 @@ static inline void put_link(struct namei - path_put(link); +--- a/fs/namei.c 2018-12-01 11:30:07.672594412 -0500 ++++ b/fs/namei.c 2018-12-01 11:30:58.772816410 -0500 +@@ -902,8 +902,8 @@ static inline void put_link(struct namei + path_put(&last->link); } -int sysctl_protected_symlinks __read_mostly = 0; -int sysctl_protected_hardlinks __read_mostly = 0; +int sysctl_protected_symlinks __read_mostly = 1; +int sysctl_protected_hardlinks __read_mostly = 1; + int sysctl_protected_fifos __read_mostly; + int sysctl_protected_regular __read_mostly; - /** - * may_follow_link - Check symlink following for unsafe situations |