CVE-2024-46695
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
13/09/2024
Last modified:
17/10/2024
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
selinux,smack: don&#39;t bypass permissions check in inode_setsecctx hook<br />
<br />
Marek Gresko reports that the root user on an NFS client is able to<br />
change the security labels on files on an NFS filesystem that is<br />
exported with root squashing enabled.<br />
<br />
The end of the kerneldoc comment for __vfs_setxattr_noperm() states:<br />
<br />
* This function requires the caller to lock the inode&#39;s i_mutex before it<br />
* is executed. It also assumes that the caller will make the appropriate<br />
* permission checks.<br />
<br />
nfsd_setattr() does do permissions checking via fh_verify() and<br />
nfsd_permission(), but those don&#39;t do all the same permissions checks<br />
that are done by security_inode_setxattr() and its related LSM hooks do.<br />
<br />
Since nfsd_setattr() is the only consumer of security_inode_setsecctx(),<br />
simplest solution appears to be to replace the call to<br />
__vfs_setxattr_noperm() with a call to __vfs_setxattr_locked(). This<br />
fixes the above issue and has the added benefit of causing nfsd to<br />
recall conflicting delegations on a file when a client tries to change<br />
its security label.
Impact
Base Score 3.x
4.40
Severity 3.x
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.6.49 (excluding) | |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.10.8 (excluding) |
cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/2dbc4b7bac60b02cc6e70d05bf6a7dfd551f9dda
- https://git.kernel.org/stable/c/459584258d47ec3cc6245a82e8a49c9d08eb8b57
- https://git.kernel.org/stable/c/76a0e79bc84f466999fa501fce5bf7a07641b8a7
- https://git.kernel.org/stable/c/eebec98791d0137e455cc006411bb92a54250924
- https://git.kernel.org/stable/c/f71ec019257ba4f7ab198bd948c5902a207bad96
- https://git.kernel.org/stable/c/fe0cd53791119f6287b6532af8ce41576d664930