CVE Vulnerabilities

CVE-2014-5206

Improper Privilege Management

Published: Aug 18, 2014 | Modified: Apr 12, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
7.2 HIGH
AV:L/AC:L/Au:N/C:C/I:C/A:C
RedHat/V2
6 IMPORTANT
AV:L/AC:H/Au:S/C:C/I:C/A:C
RedHat/V3
Ubuntu
HIGH
root.io logo minimus.io logo echo.ai logo

The do_remount function in fs/namespace.c in the Linux kernel through 3.16.1 does not maintain the MNT_LOCK_READONLY bit across a remount of a bind mount, which allows local users to bypass an intended read-only restriction and defeat certain sandbox protection mechanisms via a mount -o remount command within a user namespace.

Weakness

The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.

Affected Software

NameVendorStart VersionEnd Version
Linux_kernelLinux3.8 (including)3.10.55 (excluding)
Linux_kernelLinux3.11 (including)3.12.27 (excluding)
Linux_kernelLinux3.13 (including)3.14.19 (excluding)
Linux_kernelLinux3.15 (including)3.16.3 (excluding)
LinuxUbuntuesm-infra-legacy/trusty*
LinuxUbuntutrusty*
LinuxUbuntutrusty/esm*
LinuxUbuntuupstream*
Linux-armadaxpUbuntuupstream*
Linux-ec2Ubuntuupstream*
Linux-floUbuntutrusty*
Linux-floUbuntuupstream*
Linux-fsl-imx51Ubuntulucid*
Linux-fsl-imx51Ubuntuupstream*
Linux-goldfishUbuntutrusty*
Linux-goldfishUbuntuupstream*
Linux-grouperUbuntutrusty*
Linux-grouperUbuntuupstream*
Linux-grouperUbuntuutopic*
Linux-linaro-omapUbuntuprecise*
Linux-linaro-omapUbuntuupstream*
Linux-linaro-sharedUbuntuprecise*
Linux-linaro-sharedUbuntuupstream*
Linux-linaro-vexpressUbuntuprecise*
Linux-linaro-vexpressUbuntuupstream*
Linux-lts-quantalUbuntuupstream*
Linux-lts-raringUbuntuprecise*
Linux-lts-raringUbuntuupstream*
Linux-lts-saucyUbuntuprecise*
Linux-lts-saucyUbuntuupstream*
Linux-lts-trustyUbuntuprecise*
Linux-lts-trustyUbuntuupstream*
Linux-lts-utopicUbuntuupstream*
Linux-lts-vividUbuntuupstream*
Linux-maguroUbuntutrusty*
Linux-maguroUbuntuupstream*
Linux-makoUbuntutrusty*
Linux-makoUbuntuupstream*
Linux-mantaUbuntutrusty*
Linux-mantaUbuntuupstream*
Linux-mvl-doveUbuntulucid*
Linux-mvl-doveUbuntuupstream*
Linux-qcm-msmUbuntulucid*
Linux-qcm-msmUbuntuprecise*
Linux-qcm-msmUbuntuupstream*
Linux-raspi2Ubuntuupstream*
Linux-raspi2Ubuntuvivid/ubuntu-core*
Linux-ti-omap4Ubuntuupstream*

Potential Mitigations

References