Files
kernel_arpi/kernel
Eric W. Biederman be7c6dba23 userns: Don't allow unprivileged creation of gid mappings
As any gid mapping will allow and must allow for backwards
compatibility dropping groups don't allow any gid mappings to be
established without CAP_SETGID in the parent user namespace.

For a small class of applications this change breaks userspace
and removes useful functionality.  This small class of applications
includes tools/testing/selftests/mount/unprivilged-remount-test.c

Most of the removed functionality will be added back with the addition
of a one way knob to disable setgroups.  Once setgroups is disabled
setting the gid_map becomes as safe as setting the uid_map.

For more common applications that set the uid_map and the gid_map
with privilege this change will have no affect.

This is part of a fix for CVE-2014-8989.

Cc: stable@vger.kernel.org
Reviewed-by: Andy Lutomirski <luto@amacapital.net>
Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com>
2014-12-09 17:08:24 -06:00
..
2014-10-27 19:09:59 -04:00
2014-10-29 16:33:14 -07:00
2014-10-09 22:26:04 -04:00
2014-10-09 22:26:04 -04:00
2014-11-11 14:20:22 -05:00
2014-09-23 16:37:51 -04:00
2014-09-10 15:42:12 -07:00
2014-10-27 19:09:59 -04:00