Release Date: | 2014-10-08 | |
Impact: | Low | What is this? |
The do_umount function in fs/namespace.c in the Linux kernel through3.17 does not require the CAP_SYS_ADMIN capability for do_remount_sb calls that change the root filesystem to read-only, which allows local users to cause a denial of service (loss of writability) by making certain unshare system calls, clearing the / MNT_LOCKED flag, and making an MNT_FORCE umount system call.
See more information about CVE-2014-7975 from MITRE CVE dictionary and NIST NVD
NOTE: The following CVSS metrics and score provided are preliminary and subject to review.
Base Score: | 2.9 |
Vector String: | AV:A/AC:M/Au:N/C:N/I:N/A:P |
Version: | 2.0 |
Attack Vector: | Adjacent Network |
Attack Complexity: | Medium |
Authentication: | None |
Confidentiality Impact: | None |
Integrity Impact: | None |
Availability Impact: | Partial |
Platform | Errata | Release Date |
Oracle Linux version 6 (dtrace-modules-3.8.13-68.el6uek) | ELSA-2015-3012 | 2015-03-19 |
Oracle Linux version 6 (kernel-uek) | ELSA-2015-3012 | 2015-03-19 |
Oracle Linux version 7 (dtrace-modules-3.8.13-68.el7uek) | ELSA-2015-3012 | 2015-03-19 |
Oracle Linux version 7 (kernel) | ELSA-2017-1842 | 2017-08-07 |
Oracle Linux version 7 (kernel) | ELSA-2017-1842-1 | 2017-08-15 |
Oracle Linux version 7 (kernel-uek) | ELSA-2015-3012 | 2015-03-19 |
Oracle VM version 3.3 (kernel-uek) | OVMSA-2015-0040 | 2015-04-06 |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections: