From: Eric W. Biederman Date: Sat, 4 Oct 2014 21:44:03 +0000 (-0700) Subject: umount: Disallow unprivileged mount force X-Git-Tag: v3.10.64~19 X-Git-Url: http://review.tizen.org/git/?a=commitdiff_plain;h=c65d3b05d20c15f4421f853cbd2d41b91a12185e;p=platform%2Fkernel%2Flinux-stable.git umount: Disallow unprivileged mount force commit b2f5d4dc38e034eecb7987e513255265ff9aa1cf upstream. Forced unmount affects not just the mount namespace but the underlying superblock as well. Restrict forced unmount to the global root user for now. Otherwise it becomes possible a user in a less privileged mount namespace to force the shutdown of a superblock of a filesystem in a more privileged mount namespace, allowing a DOS attack on root. Signed-off-by: "Eric W. Biederman" Signed-off-by: Greg Kroah-Hartman --- diff --git a/fs/namespace.c b/fs/namespace.c index fb2d1ad..d0244c8 100644 --- a/fs/namespace.c +++ b/fs/namespace.c @@ -1342,6 +1342,9 @@ SYSCALL_DEFINE2(umount, char __user *, name, int, flags) goto dput_and_out; if (!check_mnt(mnt)) goto dput_and_out; + retval = -EPERM; + if (flags & MNT_FORCE && !capable(CAP_SYS_ADMIN)) + goto dput_and_out; retval = do_umount(mnt, flags); dput_and_out: