Description
The do_umount function in fs/namespace.c in the Linux kernel through 3.17 does not require the CAP_SYS_ADMIN capability for do_remount_sb calls that change the root filesystem to read-only, which allows local users to cause a denial of service (loss of writability) by making certain unshare system calls, clearing the / MNT_LOCKED flag, and making an MNT_FORCE umount system call.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2014-7824 | The do_umount function in fs/namespace.c in the Linux kernel through 3.17 does not require the CAP_SYS_ADMIN capability for do_remount_sb calls that change the root filesystem to read-only, which allows local users to cause a denial of service (loss of writability) by making certain unshare system calls, clearing the / MNT_LOCKED flag, and making an MNT_FORCE umount system call. |
Ubuntu USN |
USN-2415-1 | Linux kernel vulnerability |
Ubuntu USN |
USN-2416-1 | Linux kernel (EC2) vulnerabilities |
Ubuntu USN |
USN-2417-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-2418-1 | Linux kernel (OMAP4) vulnerabilities |
Ubuntu USN |
USN-2419-1 | Linux kernel (Trusty HWE) vulnerabilities |
Ubuntu USN |
USN-2420-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-2421-1 | Linux kernel vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T13:03:27.690Z
Reserved: 2014-10-08T00:00:00.000Z
Link: CVE-2014-7975
No data.
Status : Modified
Published: 2014-10-13T10:55:09.263
Modified: 2026-05-06T22:30:45.220
Link: CVE-2014-7975
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Ubuntu USN