Setting the setuid bit on mount.cifs is discouraged upstream and opens
interesting security vulnerabilities:

smbfs (2:3.4.5~dfsg-2) unstable; urgency=low
  * As of this version, the mount.cifs binary is no longer setuid.
    Upstream has always been increasingly unsupportive of this
    configuration over time. For instance, in bugs like
    https://bugzilla.samba.org/show_bug.cgi?id=6853, it is clearly
    mentioned that having it setuid root is discouraged.    
 -- Christian Perrier <bubu...@debian.org>  Sat, 06 Feb 2010 15:09:00 +0100

Ubuntu will not deviate from upstream or Debian in that respect, so this
"bug" won't be fixed. Rather than restoring the missing +s, I suggest
you use "sudo" when running mount.cifs. If you need finer-grained
control, you can use /etc/sudoers to define a specific group that could
run that specific command without having access to the whole thing.

** Bug watch added: Samba Bugzilla #6853
   https://bugzilla.samba.org/show_bug.cgi?id=6853

** Changed in: samba (Ubuntu)
       Status: Triaged => Won't Fix

-- 
mount.cifs won't mount shares; set uid bit not set
https://bugs.launchpad.net/bugs/563805
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to