First published: Tue May 21 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: fs: Pass AT_GETATTR_NOSEC flag to getattr interface function When vfs_getattr_nosec() calls a filesystem's getattr interface function then the 'nosec' should propagate into this function so that vfs_getattr_nosec() can again be called from the filesystem's gettattr rather than vfs_getattr(). The latter would add unnecessary security checks that the initial vfs_getattr_nosec() call wanted to avoid. Therefore, introduce the getattr flag GETATTR_NOSEC and allow to pass with the new getattr_flags parameter to the getattr interface function. In overlayfs and ecryptfs use this flag to determine which one of the two functions to call. In a recent code change introduced to IMA vfs_getattr_nosec() ended up calling vfs_getattr() in overlayfs, which in turn called security_inode_getattr() on an exiting process that did not have current->fs set anymore, which then caused a kernel NULL pointer dereference. With this change the call to security_inode_getattr() can be avoided, thus avoiding the NULL pointer dereference.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
Linux Kernel | >=6.5<6.6.4 | |
Linux Kernel | =6.7-rc1 | |
Linux Kernel | =6.7-rc2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-52779 is classified as a moderate severity vulnerability affecting the Linux kernel.
To fix CVE-2023-52779, update the Linux kernel to version 6.7 or later.
CVE-2023-52779 affects Linux kernel versions from 6.5 up to, but not including, 6.6.4, as well as 6.7-rc1 and 6.7-rc2.
CVE-2023-52779 is a privilege escalation vulnerability within the Linux kernel.
There is no known workaround, and applying the kernel update is the recommended mitigation.