All of lore.kernel.org
 help / color / mirror / Atom feed
* user namespaces: fix some uid/privilege leaks
@ 2011-11-04 22:24 ` Serge Hallyn
  0 siblings, 0 replies; 38+ messages in thread
From: Serge Hallyn @ 2011-11-04 22:24 UTC (permalink / raw)
  To: linux-kernel-u79uwXL29TY76Z2rM5mHXA,
	containers-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA
  Cc: richard-/L3Ra7n9ekc, oleg-H+wXaHxf7aLQT0dZR+AlfA,
	eparis-H+wXaHxf7aLQT0dZR+AlfA, dhowells-H+wXaHxf7aLQT0dZR+AlfA,
	ebiederm-aS9lmoZGLiVWk0Htik3J/w,
	akpm-de/tnXTf+JLsfHDXvbKv3WD2FQJk+8+b

The previous submission of these patches, and review comments, can be
seen in the thread starting here: https://lkml.org/lkml/2011/10/18/463 .
Since then, patches 
0001-pid_ns-ensure-pid-is-not-freed-during-kill_pid_info_.patch
and
0002-user-namespace-usb-make-usb-urbs-user-namespace-awar.patch
have gone upstream, and I've reverted
0009-make-net-core-scm.c-uid-comparisons-user-namespace-a.patch
because it relaxes checks, and right now we want to focus on
fixing leaks.

The set includes:

0001-user-namespace-make-signal.c-respect-user-namespaces.patch
	This convers the uid for the task sending a signal to the
	user namespace of the receiver.  It is somewhat analogous
	to what is done with the sender's pid.
	Waiting on feedback from Oleg, but I believe this patch is
	ready.

0002-User-namespace-don-t-allow-sysctl-in-non-init-user-n.patch
	This prevents root in a child user namespace from man-handling
	sysctls.  With this patch, a task in a child user namespace
	will only get the world access rights to sysctls.

0003-user-namespace-clamp-down-users-of-cap_raised.patch
	This clamps down on cases where privilege to your own user
	namespace were checked for access to the initial user namespace.

0004-Add-Documentation-namespaces-user_namespace.txt-v3.patch
	Documentation.

0005-user-namespace-make-each-net-net_ns-belong-to-a-user.patch
	This adds a struct user_namespace pointer to the net_ns for use
	by later patches.

0006-protect-cap_netlink_recv-from-user-namespaces.patch
	Now that net_ns is owned by a user_ns, cap_netlink_recv() can
	target privilege checks to the user_ns owning the resource.  The
	current check against current_cap() is unsafe.

^ permalink raw reply	[flat|nested] 38+ messages in thread

end of thread, other threads:[~2011-11-19 23:25 UTC | newest]

Thread overview: 38+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2011-11-04 22:24 user namespaces: fix some uid/privilege leaks Serge Hallyn
2011-11-04 22:24 ` Serge Hallyn
     [not found] ` <1320445482-8459-1-git-send-email-serge-A9i7LUbDfNHQT0dZR+AlfA@public.gmane.org>
2011-11-04 22:24   ` [PATCH 1/6] user namespace: make signal.c respect user namespaces (v4) Serge Hallyn
2011-11-04 22:24     ` Serge Hallyn
     [not found]     ` <1320445482-8459-2-git-send-email-serge-A9i7LUbDfNHQT0dZR+AlfA@public.gmane.org>
2011-11-09  0:22       ` Andrew Morton
2011-11-09  0:22         ` Andrew Morton
     [not found]         ` <20111108162216.1ffb3e9a.akpm-de/tnXTf+JLsfHDXvbKv3WD2FQJk+8+b@public.gmane.org>
2011-11-09 14:18           ` Serge E. Hallyn
2011-11-09 14:18         ` Serge E. Hallyn
2011-11-10  1:41           ` Matt Helsley
2011-11-10  1:41             ` Matt Helsley
     [not found]             ` <20111110014114.GB26567-52DBMbEzqgQ/wnmkkaCWp/UQ3DHhIser@public.gmane.org>
2011-11-10 14:27               ` Serge E. Hallyn
2011-11-10 14:27                 ` Serge E. Hallyn
2011-11-04 22:24   ` [PATCH 2/6] User namespace: don't allow sysctl in non-init user ns (v2) Serge Hallyn
2011-11-04 22:24     ` Serge Hallyn
2011-11-04 22:24   ` [PATCH 3/6] user namespace: clamp down users of cap_raised Serge Hallyn
2011-11-04 22:24     ` Serge Hallyn
     [not found]     ` <1320445482-8459-4-git-send-email-serge-A9i7LUbDfNHQT0dZR+AlfA@public.gmane.org>
2011-11-06  1:14       ` Andrew G. Morgan
2011-11-06  1:14         ` Andrew G. Morgan
2011-11-04 22:24   ` [PATCH 4/6] Add Documentation/namespaces/user_namespace.txt (v3) Serge Hallyn
2011-11-04 22:24     ` Serge Hallyn
2011-11-04 22:24   ` [PATCH 5/6] user namespace: make each net (net_ns) belong to a user_ns Serge Hallyn
2011-11-04 22:24     ` Serge Hallyn
2011-11-04 22:24   ` [PATCH 6/6] protect cap_netlink_recv from user namespaces Serge Hallyn
2011-11-04 22:24     ` Serge Hallyn
     [not found]     ` <1320445482-8459-7-git-send-email-serge-A9i7LUbDfNHQT0dZR+AlfA@public.gmane.org>
2011-11-07 19:35       ` Eric Paris
2011-11-07 19:35         ` Eric Paris
2011-11-08  3:29         ` Serge E. Hallyn
2011-11-08  3:29           ` Serge E. Hallyn
     [not found]           ` <20111108032902.GA29433-A9i7LUbDfNHQT0dZR+AlfA@public.gmane.org>
2011-11-09 14:19             ` Eric Paris
2011-11-09 14:19           ` Eric Paris
2011-11-09 14:44             ` Serge E. Hallyn
2011-11-09 14:44             ` Serge E. Hallyn
2011-11-19  9:10             ` Eric W. Biederman
2011-11-19  9:10               ` Eric W. Biederman
     [not found]               ` <m11ut41nqy.fsf-+imSwln9KH6u2/kzUuoCbdi2O/JbrIOy@public.gmane.org>
2011-11-19 23:25                 ` Serge E. Hallyn
2011-11-19 23:25                   ` Serge E. Hallyn
2011-11-11  4:13   ` user namespaces: fix some uid/privilege leaks Serge E. Hallyn
2011-11-11  4:13 ` Serge E. Hallyn

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.