diff options
author | Eric W. Biederman <ebiederm@xmission.com> | 2012-11-15 22:02:59 -0500 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2012-11-18 20:30:55 -0500 |
commit | 464dc801c76aa0db88e16e8f5f47c6879858b9b2 (patch) | |
tree | cfaf0f43f4ce50669f07031ec42062b4c9a7f985 /net/core/neighbour.c | |
parent | 73f7ef435934e952c1d70d83d69921ea5d1f6bd4 (diff) |
net: Don't export sysctls to unprivileged users
In preparation for supporting the creation of network namespaces
by unprivileged users, modify all of the per net sysctl exports
and refuse to allow them to unprivileged users.
This makes it safe for unprivileged users in general to access
per net sysctls, and allows sysctls to be exported to unprivileged
users on an individual basis as they are deemed safe.
Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'net/core/neighbour.c')
-rw-r--r-- | net/core/neighbour.c | 4 |
1 files changed, 4 insertions, 0 deletions
diff --git a/net/core/neighbour.c b/net/core/neighbour.c index 22571488730a..f1c0c2e9cad5 100644 --- a/net/core/neighbour.c +++ b/net/core/neighbour.c | |||
@@ -2987,6 +2987,10 @@ int neigh_sysctl_register(struct net_device *dev, struct neigh_parms *p, | |||
2987 | t->neigh_vars[NEIGH_VAR_BASE_REACHABLE_TIME_MS].extra1 = dev; | 2987 | t->neigh_vars[NEIGH_VAR_BASE_REACHABLE_TIME_MS].extra1 = dev; |
2988 | } | 2988 | } |
2989 | 2989 | ||
2990 | /* Don't export sysctls to unprivileged users */ | ||
2991 | if (neigh_parms_net(p)->user_ns != &init_user_ns) | ||
2992 | t->neigh_vars[0].procname = NULL; | ||
2993 | |||
2990 | snprintf(neigh_path, sizeof(neigh_path), "net/%s/neigh/%s", | 2994 | snprintf(neigh_path, sizeof(neigh_path), "net/%s/neigh/%s", |
2991 | p_name, dev_name_source); | 2995 | p_name, dev_name_source); |
2992 | t->sysctl_header = | 2996 | t->sysctl_header = |