net: Verify permission to dest_net in newlink
authorEric W. Biederman <ebiederm@xmission.com>
Thu, 26 Feb 2015 22:19:00 +0000 (16:19 -0600)
committerDavid S. Miller <davem@davemloft.net>
Sat, 28 Feb 2015 20:14:44 +0000 (15:14 -0500)
When applicable verify that the caller has permision to create a
network device in another network namespace.  This check is already
present when moving a network device between network namespaces in
setlink so all that is needed is to duplicate that check in newlink.

This change almost backports cleanly, but there are context conflicts
as the code that follows was added in v4.0-rc1

Fixes: b51642f6d77b net: Enable a userns root rtnl calls that are safe for unprivilged users
Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com>
Acked-by: Nicolas Dichtel <nicolas.dichtel@6wind.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
net/core/rtnetlink.c

index 1385de0fa0809828dd4467386c902ef2e718dcae..b237959c74975037437f1606ab0027d49b183c4d 100644 (file)
@@ -2122,6 +2122,10 @@ replay:
                if (IS_ERR(dest_net))
                        return PTR_ERR(dest_net);
 
+               err = -EPERM;
+               if (!netlink_ns_capable(skb, dest_net->user_ns, CAP_NET_ADMIN))
+                       goto out;
+
                if (tb[IFLA_LINK_NETNSID]) {
                        int id = nla_get_s32(tb[IFLA_LINK_NETNSID]);