Bug 275881 (CVE-2007-3740) - CVE-2007-3740 CIFS should honor umask
Summary: CVE-2007-3740 CIFS should honor umask
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2007-3740
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Jeff Layton
QA Contact: Martin Jenner
URL:
Whiteboard:
Depends On: 246667 253314 293121 293131
Blocks:
TreeView+ depends on / blocked
 
Reported: 2007-09-04 09:25 UTC by Marcel Holtmann
Modified: 2021-11-12 19:42 UTC (History)
4 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2007-11-01 13:34:12 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2007:0939 0 normal SHIPPED_LIVE Important: kernel security update 2008-01-07 18:58:13 UTC

Description Marcel Holtmann 2007-09-04 09:25:40 UTC
CIFS apparently does not currently honor the umask for a task. There's an
upstream patch to make it do so:

commit 3ce53fc4c57603d99c330a6ee2fe96d94f2d350f
Author: Steve French <sfrench.com>
Date:   Fri Jun 8 14:55:14 2007 +0000

    [CIFS] CIFS should honour umask
    
    This patch makes CIFS honour a process' umask like other filesystems.
    Of course the server is still free to munge the permissions if it wants
    to; but the client will send the "right" permissions to begin with.
    
    A few caveats:
    
    1) It only applies to filesystems that have CAP_UNIX (aka support unix
    extensions)
    2) It applies the correct mode to the follow up CIFSSMBUnixSetPerms()
    after remote creation
    
    When mode to CIFS/NTFS ACL mapping is complete we can do the
    same thing for that case for servers which do not
    support the Unix Extensions.
    
    Signed-off-by: Matt Keenen <matt>
    Signed-off-by: Steve French <sfrench.com>


Note You need to log in before you can comment on or make changes to this bug.