net: Don't export sysctls to unprivileged users
In preparation for supporting the creation of network namespaces by unprivileged users, modify all of the per net sysctl exports and refuse to allow them to unprivileged users. This makes it safe for unprivileged users in general to access per net sysctls, and allows sysctls to be exported to unprivileged users on an individual basis as they are deemed safe. Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com> Signed-off-by: David S. Miller <davem@davemloft.net>
This commit is contained in:
parent
73f7ef4359
commit
464dc801c7
22 changed files with 98 additions and 4 deletions
|
@ -1815,6 +1815,10 @@ static int __devinet_sysctl_register(struct net *net, char *dev_name,
|
|||
t->devinet_vars[i].extra2 = net;
|
||||
}
|
||||
|
||||
/* Don't export sysctls to unprivileged users */
|
||||
if (net->user_ns != &init_user_ns)
|
||||
t->devinet_vars[0].procname = NULL;
|
||||
|
||||
snprintf(path, sizeof(path), "net/ipv4/conf/%s", dev_name);
|
||||
|
||||
t->sysctl_header = register_net_sysctl(net, path, t->devinet_vars);
|
||||
|
@ -1900,6 +1904,10 @@ static __net_init int devinet_init_net(struct net *net)
|
|||
tbl[0].data = &all->data[IPV4_DEVCONF_FORWARDING - 1];
|
||||
tbl[0].extra1 = all;
|
||||
tbl[0].extra2 = net;
|
||||
|
||||
/* Don't export sysctls to unprivileged users */
|
||||
if (net->user_ns != &init_user_ns)
|
||||
tbl[0].procname = NULL;
|
||||
#endif
|
||||
}
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue