Description
The do_remount function in fs/namespace.c in the Linux kernel through 3.16.1 does not maintain the MNT_LOCK_READONLY bit across a remount of a bind mount, which allows local users to bypass an intended read-only restriction and defeat certain sandbox protection mechanisms via a "mount -o remount" command within a user namespace.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2014-5104 | The do_remount function in fs/namespace.c in the Linux kernel through 3.16.1 does not maintain the MNT_LOCK_READONLY bit across a remount of a bind mount, which allows local users to bypass an intended read-only restriction and defeat certain sandbox protection mechanisms via a "mount -o remount" command within a user namespace. |
Ubuntu USN |
USN-2317-1 | Linux kernel (Trusty HWE) vulnerabilities |
Ubuntu USN |
USN-2318-1 | Linux kernel vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T11:41:47.763Z
Reserved: 2014-08-13T00:00:00.000Z
Link: CVE-2014-5206
No data.
Status : Modified
Published: 2014-08-18T11:15:27.107
Modified: 2026-05-06T22:30:45.220
Link: CVE-2014-5206
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Ubuntu USN