lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <bug-60676-13602-zhtxmg3pVa@https.bugzilla.kernel.org/> Date: Fri, 02 Aug 2013 00:44:35 +0000 From: bugzilla-daemon@...zilla.kernel.org To: linux-ext4@...r.kernel.org Subject: [Bug 60676] Stat system call gives permission denied to root for links under a sticky bit https://bugzilla.kernel.org/show_bug.cgi?id=60676 --- Comment #3 from Theodore Tso <tytso@....edu> --- On Thu, Aug 01, 2013 at 11:21:16AM -0700, Christoph Hellwig wrote: > Try reverting 800179c9b8a1e796e441674776d11cd4c05d61d7 Or just do: echo 0 > /proc/sys/fs/protected_hardlinks echo 0 > /proc/sys/fs/protected_symlinks (or put the equivalent in /etc/sysctl.conf). There is a **very** detailed description of the design decision behind this change (which went in as of 3.6) in the commit description. See: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=800179c9b8a1e796e441674776d11cd4c05d61d7 In any case, it's "working as designed". - Ted -- You are receiving this mail because: You are watching the assignee of the bug. -- To unsubscribe from this list: send the line "unsubscribe linux-ext4" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists