add sysctl to disallow unprivileged CLONE_NEWUSER by default
authorSerge Hallyn <serge.hallyn@canonical.com>
Fri, 31 May 2013 18:12:12 +0000 (19:12 +0100)
committerBen Hutchings <ben@decadent.org.uk>
Sun, 1 Oct 2017 14:52:09 +0000 (15:52 +0100)
commit437946c703d7837a01b03367e7b2a4c154b5be56
treea35060f91afd691565015fa7015085e617aec49c
parent9f5319b038b76eea971e5e9e77d1e9107a07f18c
add sysctl to disallow unprivileged CLONE_NEWUSER by default

add sysctl to disallow unprivileged CLONE_NEWUSER by default

This is a short-term patch.  Unprivileged use of CLONE_NEWUSER
is certainly an intended feature of user namespaces.  However
for at least saucy we want to make sure that, if any security
issues are found, we have a fail-safe.

Signed-off-by: Serge Hallyn <serge.hallyn@ubuntu.com>
[bwh: Remove unneeded binary sysctl bits]

Gbp-Pq: Topic debian
Gbp-Pq: Name add-sysctl-to-disallow-unprivileged-CLONE_NEWUSER-by-default.patch
kernel/fork.c
kernel/sysctl.c
kernel/user_namespace.c