Author: dannf
Date: Sat Feb 10 21:58:10 2007
New Revision: 8298
Added:
dists/sarge-security/kernel/source/kernel-source-2.6.8-2.6.8/debian/patches/smbfs-honor-mount-opts-2.dpatch
Modified:
dists/sarge-security/kernel/source/kernel-source-2.6.8-2.6.8/debian/changelog
dists/sarge-security/kernel/source/kernel-source-2.6.8-2.6.8/debian/patches/series/2.6.8-16sarge7
Log:
* [ERRATA] smbfs-honor-mount-opts-2.dpatch
Fix some regressions with respect to file types (e.g., symlinks)
introduced by the fix for CVE-2006-5174 in 2.6.8-16sarge6
Modified:
dists/sarge-security/kernel/source/kernel-source-2.6.8-2.6.8/debian/changelog
==============================================================================
---
dists/sarge-security/kernel/source/kernel-source-2.6.8-2.6.8/debian/changelog
(original)
+++
dists/sarge-security/kernel/source/kernel-source-2.6.8-2.6.8/debian/changelog
Sat Feb 10 21:58:10 2007
@@ -1,5 +1,8 @@
kernel-source-2.6.8 (2.6.8-16sarge7) UNRELEASED; urgency=high
+ * [ERRATA] smbfs-honor-mount-opts-2.dpatch
+ Fix some regressions with respect to file types (e.g., symlinks)
+ introduced by the fix for CVE-2006-5174 in 2.6.8-16sarge6
* mincore_hang.dpatch
[SECURITY] Fix a potential deadlock in mincore, thanks to Marcel
Holtmann for the patch.
@@ -17,8 +20,9 @@
of the patch that went into 2.6.17.y. It would be better to fix the
receiving end, but no patch for the era kernel has been developed yet.
See CVE-2006-4623
+
- -- dann frazier <[EMAIL PROTECTED]> Wed, 20 Dec 2006 14:59:57 -0700
+ -- dann frazier <[EMAIL PROTECTED]> Sat, 10 Feb 2007 13:53:53 -0700
kernel-source-2.6.8 (2.6.8-16sarge6) stable-security; urgency=high
Modified:
dists/sarge-security/kernel/source/kernel-source-2.6.8-2.6.8/debian/patches/series/2.6.8-16sarge7
==============================================================================
---
dists/sarge-security/kernel/source/kernel-source-2.6.8-2.6.8/debian/patches/series/2.6.8-16sarge7
(original)
+++
dists/sarge-security/kernel/source/kernel-source-2.6.8-2.6.8/debian/patches/series/2.6.8-16sarge7
Sat Feb 10 21:58:10 2007
@@ -2,3 +2,4 @@
+ mincore_hang.dpatch
+ dev_queue_xmit-error-path.dpatch
+ dvb-core-handle-0-length-ule-sndu.dpatch
++ smbfs-honor-mount-opts-2.dpatch
Added:
dists/sarge-security/kernel/source/kernel-source-2.6.8-2.6.8/debian/patches/smbfs-honor-mount-opts-2.dpatch
==============================================================================
--- (empty file)
+++
dists/sarge-security/kernel/source/kernel-source-2.6.8-2.6.8/debian/patches/smbfs-honor-mount-opts-2.dpatch
Sat Feb 10 21:58:10 2007
@@ -0,0 +1,64 @@
+
+#### ChangeSet ####
+2004-11-19 15:02:14-08:00, [EMAIL PROTECTED]
+ [PATCH] smbfs: Bug #3758 - Broken symlinks on smbfs
+
+ The patches attached here fixes the BUG #3758 - "Broken symlinks on smbfs
+ with 2.6.10-rc[12]". There are two patches, one to be applied over version
+ 2.6.9 and the other over 2.6.10-rc2.
+
+ The old utilities (and the old driver) uses uid=0, gid=0, dmask=0 and
+ fmask=0 to flag the lack of this parameters on the mount command line.
+ When the user do not specify the uid, gid, fmask or dmask, the current
+ driver will assign gid=root, gid=root, dmask=755, fmask=755. This behavior
+ is similar to the old 2.x samba versions.
+
+ To make the driver see the permissions and ownership assigned on the
+ server, "smbmount" and "smbmnt" utilities must be patched. The patches is
+ already available on the attached patches at Bug #3330 or Samba Bug #999.
+
+ Signed-off-by: Andrew Morton <[EMAIL PROTECTED]>
+ Signed-off-by: Linus Torvalds <[EMAIL PROTECTED]>
+
+==== fs/smbfs/inode.c ====
+2004-11-18 23:03:16-08:00, [EMAIL PROTECTED] +4 -4
+ smbfs: Bug #3758 - Broken symlinks on smbfs
+
+--- 1.52/fs/smbfs/inode.c 2004-10-19 02:40:29 -07:00
++++ 1.53/fs/smbfs/inode.c 2004-11-18 23:03:16 -08:00
+@@ -574,10 +574,10 @@ int smb_fill_super(struct super_block *s
+ mnt->flags = (oldmnt->file_mode >> 9) | SMB_MOUNT_UID |
+ SMB_MOUNT_GID | SMB_MOUNT_FMODE | SMB_MOUNT_DMODE;
+ } else {
+- mnt->file_mode = mnt->dir_mode = S_IRWXU | S_IRGRP | S_IXGRP |
+- S_IROTH | S_IXOTH | S_IFREG;
+- mnt->dir_mode = mnt->dir_mode = S_IRWXU | S_IRGRP | S_IXGRP |
+- S_IROTH | S_IXOTH | S_IFDIR;
++ mnt->file_mode = S_IRWXU | S_IRGRP | S_IXGRP |
++ S_IROTH | S_IXOTH | S_IFREG;
++ mnt->dir_mode = S_IRWXU | S_IRGRP | S_IXGRP |
++ S_IROTH | S_IXOTH | S_IFDIR;
+ if (parse_options(mnt, raw_data))
+ goto out_bad_option;
+ }
+
+==== fs/smbfs/proc.c ====
+2004-11-18 23:03:16-08:00, [EMAIL PROTECTED] +3 -2
+ smbfs: Bug #3758 - Broken symlinks on smbfs
+
+--- 1.42/fs/smbfs/proc.c 2004-10-19 02:40:29 -07:00
++++ 1.43/fs/smbfs/proc.c 2004-11-18 23:03:16 -08:00
+@@ -2138,10 +2138,11 @@ void smb_decode_unix_basic(struct smb_fa
+
+ if ( (server->mnt->flags & SMB_MOUNT_DMODE) &&
+ (S_ISDIR(fattr->f_mode)) )
+- fattr->f_mode = (server->mnt->dir_mode & (S_IRWXU | S_IRWXG |
S_IRWXO)) | S_IFDIR;
++ fattr->f_mode = (server->mnt->dir_mode & S_IRWXUGO) | S_IFDIR;
+ else if ( (server->mnt->flags & SMB_MOUNT_FMODE) &&
+ !(S_ISDIR(fattr->f_mode)) )
+- fattr->f_mode = (server->mnt->file_mode & (S_IRWXU | S_IRWXG |
S_IRWXO)) | S_IFREG;
++ fattr->f_mode = (server->mnt->file_mode & S_IRWXUGO) |
++ (fattr->f_mode & S_IFMT);
+
+ }
+
_______________________________________________
Kernel-svn-changes mailing list
[email protected]
http://lists.alioth.debian.org/mailman/listinfo/kernel-svn-changes