lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <87o87qxsay.fsf@disp2133> Date: Fri, 15 Oct 2021 09:43:01 -0500 From: ebiederm@...ssion.com (Eric W. Biederman) To: Alexey Gladkov <legion@...nel.org> Cc: LKML <linux-kernel@...r.kernel.org>, linux-nfs@...r.kernel.org, Trond Myklebust <trond.myklebust@...merspace.com>, Anna Schumaker <anna.schumaker@...app.com>, Sargun Dhillon <sargun@...gun.me> Subject: Re: [PATCH] Fix user namespace leak Alexey Gladkov <legion@...nel.org> writes: > Fixes: 61ca2c4afd9d ("NFS: Only reference user namespace from nfs4idmap struct instead of cred") > Signed-off-by: Alexey Gladkov <legion@...nel.org> Reviewed-by: "Eric W. Biederman" <ebiederm@...ssion.com> nfs folks do you want to pick this up? > --- > fs/nfs/nfs4idmap.c | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/fs/nfs/nfs4idmap.c b/fs/nfs/nfs4idmap.c > index 8d8aba305ecc..f331866dd418 100644 > --- a/fs/nfs/nfs4idmap.c > +++ b/fs/nfs/nfs4idmap.c > @@ -487,7 +487,7 @@ nfs_idmap_new(struct nfs_client *clp) > err_destroy_pipe: > rpc_destroy_pipe_data(idmap->idmap_pipe); > err: > - get_user_ns(idmap->user_ns); > + put_user_ns(idmap->user_ns); > kfree(idmap); > return error; > }
Powered by blists - more mailing lists