cpe:/o:linux:linux_kernel:4.0.1 CVE-2014-9717 2016-05-02T06:59:06.593-04:00 2016-08-11T21:59:05.210-04:00 3.6 LOCAL LOW NONE PARTIAL PARTIAL NONE http://nvd.nist.gov 2016-08-03T14:59:55.827-04:00 BID 74226 SUSE SUSE-SU-2016:1690 SUSE SUSE-SU-2016:1696 SUSE SUSE-SU-2016:1937 MLIST [containers] 20150402 [PATCH review 0/19] Locked mount and loopback mount fixes MLIST [linux-kernel] 20141007 [PATCH] mnt: don't allow to detach the namespace root MLIST [oss-security] 20150417 USERNS allows circumventing MNT_LOCKED CONFIRM http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ce07d891a0891d3c0d0c2d73d577490486b809e1 CONFIRM http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.0.2 CONFIRM https://bugzilla.redhat.com/show_bug.cgi?id=1226751 CONFIRM https://github.com/torvalds/linux/commit/ce07d891a0891d3c0d0c2d73d577490486b809e1 fs/namespace.c in the Linux kernel before 4.0.2 processes MNT_DETACH umount2 system calls without verifying that the MNT_LOCKED flag is unset, which allows local users to bypass intended access restrictions and navigate to filesystem locations beneath a mount by calling umount2 within a user namespace.