diff options
author | Eric W. Biederman <ebiederm@xmission.com> | 2014-07-29 15:50:44 -0700 |
---|---|---|
committer | Eric W. Biederman <ebiederm@xmission.com> | 2014-07-31 17:13:15 -0700 |
commit | db181ce011e3c033328608299cd6fac06ea50130 (patch) | |
tree | 45122ca259c9310f7082e9920713a073fe127ddb /scripts | |
parent | ffbc6f0ead47fa5a1dc9642b0331cb75c20a640e (diff) | |
download | op-kernel-dev-db181ce011e3c033328608299cd6fac06ea50130.zip op-kernel-dev-db181ce011e3c033328608299cd6fac06ea50130.tar.gz |
mnt: Add tests for unprivileged remount cases that have found to be faulty
Kenton Varda <kenton@sandstorm.io> discovered that by remounting a
read-only bind mount read-only in a user namespace the
MNT_LOCK_READONLY bit would be cleared, allowing an unprivileged user
to the remount a read-only mount read-write.
Upon review of the code in remount it was discovered that the code allowed
nosuid, noexec, and nodev to be cleared. It was also discovered that
the code was allowing the per mount atime flags to be changed.
The first naive patch to fix these issues contained the flaw that using
default atime settings when remounting a filesystem could be disallowed.
To avoid this problems in the future add tests to ensure unprivileged
remounts are succeeding and failing at the appropriate times.
Cc: stable@vger.kernel.org
Acked-by: Serge E. Hallyn <serge.hallyn@ubuntu.com>
Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com>
Diffstat (limited to 'scripts')
0 files changed, 0 insertions, 0 deletions