[kernel] r7786 - in dists/sarge-security/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian: . patches patches/series

Dann Frazier dannf at alioth.debian.org
Mon Nov 13 04:43:28 UTC 2006


Author: dannf
Date: Mon Nov 13 05:43:27 2006
New Revision: 7786

Added:
   dists/sarge-security/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/patches/237_smbfs-no-cap-unix.diff
Modified:
   dists/sarge-security/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/changelog
   dists/sarge-security/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/patches/series/2.4.27-10sarge5
Log:
* 237_smbfs-no-cap-unix.diff
  [SECURITY] Disable SMB_CAP_UNIX if uid, gid, fmask or dmask are set.
  Now that smbfs supports CAP_UNIX, these options are ignored when
  connecting to a samba server in favor of passing through the Unix
  permissions from the remote server. This is a behavior change from
  woody that users likely will not expect, so disabling.
  Closes: #310982

Modified: dists/sarge-security/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/changelog
==============================================================================
--- dists/sarge-security/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/changelog	(original)
+++ dists/sarge-security/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/changelog	Mon Nov 13 05:43:27 2006
@@ -17,8 +17,15 @@
     remaining bytes of the kernel buffer after a fault on the userspace
     address in copy_from_user()
     See CVE-2006-5174
+  * 237_smbfs-no-cap-unix.diff
+    [SECURITY] Disable SMB_CAP_UNIX if uid, gid, fmask or dmask are set.
+    Now that smbfs supports CAP_UNIX, these options are ignored when
+    connecting to a samba server in favor of passing through the Unix
+    permissions from the remote server. This is a behavior change from
+    woody that users likely will not expect, so disabling.
+    Closes: #310982
 
- -- dann frazier <dannf at debian.org>  Sun, 12 Nov 2006 20:58:14 -0700
+ -- dann frazier <dannf at debian.org>  Sun, 12 Nov 2006 21:12:42 -0700
 
 kernel-source-2.4.27 (2.4.27-10sarge4) stable-security; urgency=high
 

Added: dists/sarge-security/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/patches/237_smbfs-no-cap-unix.diff
==============================================================================
--- (empty file)
+++ dists/sarge-security/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/patches/237_smbfs-no-cap-unix.diff	Mon Nov 13 05:43:27 2006
@@ -0,0 +1,45 @@
+diff -pru kernel-source-2.4.27.orig/include/linux/smb_mount.h kernel-source-2.4.27/include/linux/smb_mount.h
+--- kernel-source-2.4.27.orig/include/linux/smb_mount.h	2004-02-18 22:36:32.000000000 +0900
++++ kernel-source-2.4.27/include/linux/smb_mount.h	2005-07-07 11:27:51.000000000 +0900
+@@ -37,7 +37,9 @@ struct smb_mount_data {
+ #define SMB_MOUNT_OLDATTR	0x0002	/* Use core getattr (Win 95 speedup) */
+ #define SMB_MOUNT_DIRATTR	0x0004	/* Use find_first for getattr */
+ #define SMB_MOUNT_CASE		0x0008	/* Be case sensitive */
+-
++#define SMB_MOUNT_NO_CAP_UNIX	0x0010	/* Hack for Debian to disable 
++					   SMB_CAP_UNIX if uid, gid, fmask
++					   or dmask are set. See Bug#310982 */
+ 
+ struct smb_mount_data_kernel {
+ 	int version;
+diff -pru kernel-source-2.4.27.orig/fs/smbfs/inode.c kernel-source-2.4.27/fs/smbfs/inode.c
+--- kernel-source-2.4.27.orig/fs/smbfs/inode.c	2004-02-18 22:36:31.000000000 +0900
++++ kernel-source-2.4.27/fs/smbfs/inode.c	2005-07-07 10:50:56.000000000 +0900
+@@ -286,10 +286,10 @@ static struct option opts[] = {
+ 	{ "oldattr",	SMB_MOUNT_OLDATTR, 1 },
+ 	{ "dirattr",	SMB_MOUNT_DIRATTR, 1 },
+ 	{ "case",	SMB_MOUNT_CASE, 1 },
+-	{ "uid",	0, 'u' },
+-	{ "gid",	0, 'g' },
+-	{ "file_mode",	0, 'f' },
+-	{ "dir_mode",	0, 'd' },
++	{ "uid",	SMB_MOUNT_NO_CAP_UNIX, 'u' },
++	{ "gid",	SMB_MOUNT_NO_CAP_UNIX, 'g' },
++	{ "file_mode",	SMB_MOUNT_NO_CAP_UNIX, 'f' },
++	{ "dir_mode",	SMB_MOUNT_NO_CAP_UNIX, 'd' },
+ 	{ "iocharset",	0, 'i' },
+ 	{ "codepage",	0, 'c' },
+ 	{ "ttl",	0, 't' },
+diff -pru kernel-source-2.4.27.orig/fs/smbfs/proc.c kernel-source-2.4.27/fs/smbfs/proc.c
+--- kernel-source-2.4.27.orig/fs/smbfs/proc.c	2005-05-19 19:29:38.000000000 +0900
++++ kernel-source-2.4.27/fs/smbfs/proc.c	2005-07-07 10:49:35.000000000 +0900
+@@ -916,7 +916,8 @@ smb_newconn(struct smb_sb_info *server, 
+ 		VERBOSE("LFS enabled\n");
+ 	}
+ #ifndef CONFIG_SMB_UNIX
+-	server->opt.capabilities &= ~SMB_CAP_UNIX;
++	if (!server->mnt.flags & SMB_MOUNT_NO_CAP_UNIX)
++		server->opt.capabilities &= ~SMB_CAP_UNIX;
+ #endif
+ 	if (server->opt.capabilities & SMB_CAP_UNIX) {
+ 		struct inode *inode;

Modified: dists/sarge-security/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/patches/series/2.4.27-10sarge5
==============================================================================
--- dists/sarge-security/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/patches/series/2.4.27-10sarge5	(original)
+++ dists/sarge-security/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/patches/series/2.4.27-10sarge5	Mon Nov 13 05:43:27 2006
@@ -2,3 +2,4 @@
 + 234_atm-clip-freed-skb-deref.diff
 + 235_ppc-alignment-exception-table-check.diff
 + 236_s390-uaccess-memleak.diff
++ 237_smbfs-no-cap-unix.diff



More information about the Kernel-svn-changes mailing list