** Changed in: linux (Ubuntu Trusty) Status: Fix Committed => Fix Released
** Description changed: - Remounting a read-only bind mount read-only in a user namespace the - MNT_LOCK_READONLY bit would be cleared, allowing an unprivileged user to - the remount a read-only mount read-write. + The do_remount function in fs/namespace.c in the Linux kernel through + 3.16.1 does not maintain the MNT_LOCK_READONLY bit across a remount of a + bind mount, which allows local users to bypass an intended read-only + restriction and defeat certain sandbox protection mechanisms via a + "mount -o remount" command within a user namespace. Break-Fix: 0c55cfc4166d9a0f38de779bd4d75a90afbe7734 a6138db815df5ee542d848318e5dae681590fccd Break-Fix: 0c55cfc4166d9a0f38de779bd4d75a90afbe7734 07b645589dcda8b7a5249e096fece2a67556f0f4 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1356318 Title: CVE-2014-5206 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1356318/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs