diff options
author | Eric W. Biederman <ebiederm@xmission.com> | 2012-12-14 17:50:54 +0100 |
---|---|---|
committer | Eric W. Biederman <ebiederm@xmission.com> | 2012-12-15 03:36:26 +0100 |
commit | aa6d054e5ce94720797ca260392a74dbced56412 (patch) | |
tree | 4e7093d4e288238f0514187e87b13738504a21df /kernel/user_namespace.c | |
parent | userns: Require CAP_SYS_ADMIN for most uses of setns. (diff) | |
download | linux-aa6d054e5ce94720797ca260392a74dbced56412.tar.xz linux-aa6d054e5ce94720797ca260392a74dbced56412.zip |
userns: Add a more complete capability subset test to commit_creds
When unsharing a user namespace we reduce our credentials to just what
can be done in that user namespace. This is a subset of the credentials
we previously had. Teach commit_creds to recognize this is a subset
of the credentials we have had before and don't clear the dumpability flag.
This allows an unprivileged program to do:
unshare(CLONE_NEWUSER);
fd = open("/proc/self/uid_map", O_RDWR);
Where previously opening the uid_map writable would fail because
the the task had been made non-dumpable.
Acked-by: Serge Hallyn <serge.hallyn@canonical.com>
Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com>
Diffstat (limited to 'kernel/user_namespace.c')
0 files changed, 0 insertions, 0 deletions