summaryrefslogtreecommitdiff
path: root/system/easy-kernel/0122-link-security-restrictions.patch
diff options
context:
space:
mode:
authorA. Wilcox <AWilcox@Wilcox-Tech.com>2023-10-02 00:03:08 -0500
committerA. Wilcox <AWilcox@Wilcox-Tech.com>2023-10-03 21:56:52 -0500
commitee71f0098a7782c4a95c2f1d7ee614569214be1c (patch)
tree120b55e6bde7f7f7f726ba8b34355bccbbc79482 /system/easy-kernel/0122-link-security-restrictions.patch
parent8b868f32f7e1b57c90da65157ea59eb6ce337cc9 (diff)
downloadpackages-ee71f0098a7782c4a95c2f1d7ee614569214be1c.tar.gz
packages-ee71f0098a7782c4a95c2f1d7ee614569214be1c.tar.bz2
packages-ee71f0098a7782c4a95c2f1d7ee614569214be1c.tar.xz
packages-ee71f0098a7782c4a95c2f1d7ee614569214be1c.zip
system/easy-kernel: Update to 5.15.132-mc6
* Adds exFAT module to all architectures. * Adds Hyper-V guest support to aarch64. * Fixes audio output issues on some PowerBook models.
Diffstat (limited to 'system/easy-kernel/0122-link-security-restrictions.patch')
-rw-r--r--system/easy-kernel/0122-link-security-restrictions.patch21
1 files changed, 9 insertions, 12 deletions
diff --git a/system/easy-kernel/0122-link-security-restrictions.patch b/system/easy-kernel/0122-link-security-restrictions.patch
index f0ed144fb..1b3e590d9 100644
--- a/system/easy-kernel/0122-link-security-restrictions.patch
+++ b/system/easy-kernel/0122-link-security-restrictions.patch
@@ -1,20 +1,17 @@
-From: Ben Hutchings <ben@decadent.org.uk>
-Subject: fs: Enable link security restrictions by default
-Date: Fri, 02 Nov 2012 05:32:06 +0000
-Bug-Debian: https://bugs.debian.org/609455
-Forwarded: not-needed
-This reverts commit 561ec64ae67ef25cac8d72bb9c4bfc955edfd415
-('VFS: don't do protected {sym,hard}links by default').
---- a/fs/namei.c 2018-09-28 07:56:07.770005006 -0400
-+++ b/fs/namei.c 2018-09-28 07:56:43.370349204 -0400
-@@ -885,8 +885,8 @@ static inline void put_link(struct namei
+--- a/fs/namei.c 2022-01-09 17:55:34.000000000 -0500
++++ b/fs/namei.c 2022-02-26 11:32:31.832844465 -0500
+@@ -1020,10 +1020,10 @@ static inline void put_link(struct namei
path_put(&last->link);
}
-int sysctl_protected_symlinks __read_mostly = 0;
-int sysctl_protected_hardlinks __read_mostly = 0;
+-int sysctl_protected_fifos __read_mostly;
+-int sysctl_protected_regular __read_mostly;
+int sysctl_protected_symlinks __read_mostly = 1;
+int sysctl_protected_hardlinks __read_mostly = 1;
- int sysctl_protected_fifos __read_mostly;
- int sysctl_protected_regular __read_mostly;
++int sysctl_protected_fifos __read_mostly = 1;
++int sysctl_protected_regular __read_mostly = 1;
+ /**
+ * may_follow_link - Check symlink following for unsafe situations