From mboxrd@z Thu Jan 1 00:00:00 1970 From: Andy Lutomirski Subject: [PATCH 0/2] Rename nsproxy.pid_ns and fix a related security bug Date: Thu, 22 Aug 2013 11:39:14 -0700 Message-ID: Cc: linux-kernel@vger.kernel.org, netdev@vger.kernel.org, Andy Lutomirski To: "Eric W. Biederman" , security@kernel.org Return-path: Sender: linux-kernel-owner@vger.kernel.org List-Id: netdev.vger.kernel.org In: commit 92f28d973cce45ef5823209aab3138eb45d8b349 Author: Eric W. Biederman Date: Fri Mar 15 01:03:33 2013 -0700 scm: Require CAP_SYS_ADMIN over the current pidns to spoof pids. Eric fell for my bogus claim that nsproxy->pid_ns was the current' process's pid ns. This isn't true. Let's fix the bug and rename pid_ns so that no one gets this wrong again. Signed-off-by: Andy Lutomirski Andy Lutomirski (2): net: Check the correct namespace when spoofing pid over SCM_RIGHTS Rename nsproxy.pid_ns to nsproxy.pid_ns_for_children include/linux/nsproxy.h | 6 +++++- kernel/fork.c | 5 +++-- kernel/nsproxy.c | 27 ++++++++++++++------------- kernel/pid_namespace.c | 4 ++-- net/core/scm.c | 2 +- 5 files changed, 25 insertions(+), 19 deletions(-) -- 1.8.3.1