Re: [PATCH 0/2] Rename nsproxy.pid_ns and fix a related security bug

From: Eric W. Biederman
Date: Mon Aug 26 2013 - 21:04:12 EST


David Miller <davem@xxxxxxxxxxxxx> writes:

> From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
> Date: Thu, 22 Aug 2013 11:39:14 -0700
>
>> commit 92f28d973cce45ef5823209aab3138eb45d8b349
>> Author: Eric W. Biederman <ebiederm@xxxxxxxxxxxx>
>> Date: Fri Mar 15 01:03:33 2013 -0700
>>
>> scm: Require CAP_SYS_ADMIN over the current pidns to spoof pids.
>>
>> Eric fell for my bogus claim that nsproxy->pid_ns was the current'
>> process's pid ns. This isn't true.
>>
>> Let's fix the bug and rename pid_ns so that no one gets this wrong again.
>>
>> Signed-off-by: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
>
> Eric please take the time to review these changes, thanks.

Reviewed they are good.

My apologies for the delay life got in my way and I fell behind on
dealing with patches.

Eric


--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/