add sysctl to disallow unprivileged CLONE_NEWUSER by default
authorSerge Hallyn <serge.hallyn@canonical.com>
Fri, 31 May 2013 18:12:12 +0000 (19:12 +0100)
committerBen Hutchings <ben@decadent.org.uk>
Fri, 15 Mar 2019 02:16:04 +0000 (02:16 +0000)
commitec27b0a954d23832c8545405604d0731b80de7e3
treea431a601bab51cb409016c77bfa6a6ee3796f680
parentd8f8f4910c0f52e9557dda3caeaead1256e10492
add sysctl to disallow unprivileged CLONE_NEWUSER by default

add sysctl to disallow unprivileged CLONE_NEWUSER by default

This is a short-term patch.  Unprivileged use of CLONE_NEWUSER
is certainly an intended feature of user namespaces.  However
for at least saucy we want to make sure that, if any security
issues are found, we have a fail-safe.

Signed-off-by: Serge Hallyn <serge.hallyn@ubuntu.com>
[bwh: Remove unneeded binary sysctl bits]

Gbp-Pq: Topic debian
Gbp-Pq: Name add-sysctl-to-disallow-unprivileged-CLONE_NEWUSER-by-default.patch
kernel/fork.c
kernel/sysctl.c
kernel/user_namespace.c