** Changed in: linux (Ubuntu Trusty)
       Status: Fix Committed => Fix Released

** Description changed:

- Remounting a read-only bind mount read-only in a user namespace the
- MNT_LOCK_READONLY bit would be cleared, allowing an unprivileged user to
- the remount a read-only mount read-write.
+ The do_remount function in fs/namespace.c in the Linux kernel through
+ 3.16.1 does not maintain the MNT_LOCK_READONLY bit across a remount of a
+ bind mount, which allows local users to bypass an intended read-only
+ restriction and defeat certain sandbox protection mechanisms via a
+ "mount -o remount" command within a user namespace.
  
  Break-Fix: 0c55cfc4166d9a0f38de779bd4d75a90afbe7734 
a6138db815df5ee542d848318e5dae681590fccd
  Break-Fix: 0c55cfc4166d9a0f38de779bd4d75a90afbe7734 
07b645589dcda8b7a5249e096fece2a67556f0f4

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1356318

Title:
  CVE-2014-5206

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1356318/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to