** Changed in: linux (Ubuntu Trusty)
Status: Fix Committed => Fix Released
** Description changed:
- Remounting a read-only bind mount read-only in a user namespace the
- MNT_LOCK_READONLY bit would be cleared, allowing an unprivileged user to
- the remount a read-only mount read-write.
+ The do_remount function in fs/namespace.c in the Linux kernel through
+ 3.16.1 does not maintain the MNT_LOCK_READONLY bit across a remount of a
+ bind mount, which allows local users to bypass an intended read-only
+ restriction and defeat certain sandbox protection mechanisms via a
+ "mount -o remount" command within a user namespace.
Break-Fix: 0c55cfc4166d9a0f38de779bd4d75a90afbe7734
a6138db815df5ee542d848318e5dae681590fccd
Break-Fix: 0c55cfc4166d9a0f38de779bd4d75a90afbe7734
07b645589dcda8b7a5249e096fece2a67556f0f4
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1356318
Title:
CVE-2014-5206
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1356318/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs