lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20130802004426.GF12830@thunk.org> Date: Thu, 1 Aug 2013 20:44:26 -0400 From: Theodore Ts'o <tytso@....edu> To: Christoph Hellwig <hch@...radead.org> Cc: bugzilla-daemon@...zilla.kernel.org, linux-ext4@...r.kernel.org Subject: Re: [Bug 60676] New: Stat system call gives permission denied to root for links under a sticky bit On Thu, Aug 01, 2013 at 11:21:16AM -0700, Christoph Hellwig wrote: > Try reverting 800179c9b8a1e796e441674776d11cd4c05d61d7 Or just do: echo 0 > /proc/sys/fs/protected_hardlinks echo 0 > /proc/sys/fs/protected_symlinks (or put the equivalent in /etc/sysctl.conf). There is a **very** detailed description of the design decision behind this change (which went in as of 3.6) in the commit description. See: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=800179c9b8a1e796e441674776d11cd4c05d61d7 In any case, it's "working as designed". - Ted -- To unsubscribe from this list: send the line "unsubscribe linux-ext4" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists