ghsa-jvc4-gpm6-jw84
Vulnerability from github
Published
2022-05-13 01:23
Modified
2022-05-13 01:23
Severity
Details

The do_umount function in fs/namespace.c in the Linux kernel through 3.17 does not require the CAP_SYS_ADMIN capability for do_remount_sb calls that change the root filesystem to read-only, which allows local users to cause a denial of service (loss of writability) by making certain unshare system calls, clearing the / MNT_LOCKED flag, and making an MNT_FORCE umount system call.

Show details on source website


{
  "affected": [],
  "aliases": [
    "CVE-2014-7975"
  ],
  "database_specific": {
    "cwe_ids": [],
    "github_reviewed": false,
    "github_reviewed_at": null,
    "nvd_published_at": "2014-10-13T10:55:00Z",
    "severity": "MODERATE"
  },
  "details": "The do_umount function in fs/namespace.c in the Linux kernel through 3.17 does not require the CAP_SYS_ADMIN capability for do_remount_sb calls that change the root filesystem to read-only, which allows local users to cause a denial of service (loss of writability) by making certain unshare system calls, clearing the / MNT_LOCKED flag, and making an MNT_FORCE umount system call.",
  "id": "GHSA-jvc4-gpm6-jw84",
  "modified": "2022-05-13T01:23:24Z",
  "published": "2022-05-13T01:23:24Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7975"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2017:1842"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2017:2077"
    },
    {
      "type": "WEB",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1151108"
    },
    {
      "type": "WEB",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96994"
    },
    {
      "type": "WEB",
      "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0ef3a56b1c466629cd0bf482b09c7b0e5a085bb5"
    },
    {
      "type": "WEB",
      "url": "http://secunia.com/advisories/60174"
    },
    {
      "type": "WEB",
      "url": "http://secunia.com/advisories/61145"
    },
    {
      "type": "WEB",
      "url": "http://secunia.com/advisories/62633"
    },
    {
      "type": "WEB",
      "url": "http://secunia.com/advisories/62634"
    },
    {
      "type": "WEB",
      "url": "http://thread.gmane.org/gmane.linux.kernel.stable/109312"
    },
    {
      "type": "WEB",
      "url": "http://www.openwall.com/lists/oss-security/2014/10/08/22"
    },
    {
      "type": "WEB",
      "url": "http://www.securityfocus.com/bid/70314"
    },
    {
      "type": "WEB",
      "url": "http://www.securitytracker.com/id/1031180"
    },
    {
      "type": "WEB",
      "url": "http://www.ubuntu.com/usn/USN-2415-1"
    },
    {
      "type": "WEB",
      "url": "http://www.ubuntu.com/usn/USN-2416-1"
    },
    {
      "type": "WEB",
      "url": "http://www.ubuntu.com/usn/USN-2417-1"
    },
    {
      "type": "WEB",
      "url": "http://www.ubuntu.com/usn/USN-2418-1"
    },
    {
      "type": "WEB",
      "url": "http://www.ubuntu.com/usn/USN-2419-1"
    },
    {
      "type": "WEB",
      "url": "http://www.ubuntu.com/usn/USN-2420-1"
    },
    {
      "type": "WEB",
      "url": "http://www.ubuntu.com/usn/USN-2421-1"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [
    {
      "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "type": "CVSS_V3"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...