Hi,

It is actually a temporary mesure until mount.cifs will be fixed to be safe 
when it is setuid, see :
http://lists.samba.org/archive/linux-cifs-client/2010-February/005558.html

As I understand, the threat is a local root exploit. But I think that a lot of 
people don't expect 
that somebody make a local root exploit in their computer. For example the 
people that are
the only user using their computer. Nobody else than them can login, right ?
So why not instead of making impossible mount.cifs to be used setuid (which 
seems to me
not improving the security for all the users), tell the users when
it is safe to be launch setuid and when it is not, so they could make the 
choice ?

Bye
Jonas


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to