Unrated severityNVD Advisory· Published Aug 18, 2014· Updated May 6, 2026
CVE-2014-5206
CVE-2014-5206
Description
The do_remount function in fs/namespace.c in the Linux kernel through 3.16.1 does not maintain the MNT_LOCK_READONLY bit across a remount of a bind mount, which allows local users to bypass an intended read-only restriction and defeat certain sandbox protection mechanisms via a "mount -o remount" command within a user namespace.
Affected products
3cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*+ 1 more
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- bugzilla.redhat.com/show_bug.cginvdIssue TrackingPatchThird Party Advisory
- github.com/torvalds/linux/commit/a6138db815df5ee542d848318e5dae681590fccdnvdPatchThird Party Advisory
- www.openwall.com/lists/oss-security/2014/08/13/4nvdMailing ListThird Party Advisory
- www.securityfocus.com/bid/69214nvdThird Party AdvisoryVDB Entry
- www.ubuntu.com/usn/USN-2317-1nvdThird Party Advisory
- www.ubuntu.com/usn/USN-2318-1nvdThird Party Advisory
News mentions
0No linked articles in our index yet.