CVE-2014-9717

Loading...

General

Score:3.6/10.0
Severity:Low
Category:Access Control Error

Impact Metrics

Confidentiality:Partial
Integrity:Partial
Availability:None

Exploitability Metrics

Access Vector:Local
Access Complexity:Low
Authentication:None

Relative vulnerabilities

CVE-2015-8816, CVE-2015-8845, CVE-2016-0758, CVE-2016-1583, CVE-2016-2053, CVE-2016-2143, CVE-2016-2184, CVE-2016-2185, CVE-2016-2186, CVE-2016-2188, CVE-2016-2782, CVE-2016-2847, CVE-2016-3134, CVE-2016-3136, CVE-2016-3137, CVE-2016-3138, CVE-2016-3139, CVE-2016-3140, CVE-2016-3156, CVE-2016-3672, CVE-2016-3689, CVE-2016-3951, CVE-2016-4482, CVE-2016-4486, CVE-2016-4565, CVE-2016-4569, CVE-2016-4578, CVE-2016-4805, CVE-2016-5244

Published on 02/05/16 - Updated on 12/08/16

Description

fs/namespace.c in the Linux kernel before 4.0.2 processes MNT_DETACH umount2 system calls without verifying that the MNT_LOCKED flag is unset, which allows local users to bypass intended access restrictions and navigate to filesystem locations beneath a mount by calling umount2 within a user namespace.

Category: Access Control Error

CWE-284 (Improper Access Control)
The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.

Security Notices

US National Vulnerability DatabaseCVE-2014-9717
SUSE SUSE-SU-2016:1690, SUSE-SU-2016:1696

Exploits

No exploits available for this CVE in our database.

Relative technologies

VendorProduct
linuxlinux_kernel

Share this vulnerability with:

Twitter Facebook LinkedIn Mail