Bug 2275616 (CVE-2024-26821)
Summary: | CVE-2024-26821 kernel: fs: relax mount_setattr() permission checks | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Robb Gatica <rgatica> |
Component: | vulnerability | Assignee: | Product Security <prodsec-ir-bot> |
Status: | NEW --- | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | acaringi, allarkin, aquini, bhu, chwhite, cye, cyin, dbohanno, debarbos, dfreiber, drow, dvlasenk, esandeen, ezulian, hkrzesin, jarod, jburrell, jdenham, jfaracco, jlelli, joe.lawrence, jshortt, jstancek, jwyatt, kcarcia, ldoskova, lgoncalv, lzampier, mleitner, mmilgram, mstowell, nmurray, ptalbert, rparrazo, rrobaina, rvrbovsk, rysulliv, scweaver, sidakwo, sukulkar, tglozar, tyberry, vkumar, wcosta, williams, wmealing, ycote, ykopkova, zhijwang |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | kernel 6.1.79, kernel 6.6.18, kernel 6.7.6, kernel 6.8 | Doc Type: | If docs needed, set a value |
Doc Text: |
[REJECTED CVE] CVE-2024-26821 was initially identified as a vulnerability related to the mount_setattr() function in the Linux kernel, which dealt with permission checks for mounting file systems. The issue was addressed by relaxing certain permission checks to align with legacy behavior. However, this CVE has been rejected and is no longer considered a valid security vulnerability.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | Type: | --- | |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2275617 | ||
Bug Blocks: | 2275560 |
Description
Robb Gatica
2024-04-17 16:39:26 UTC
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 2275617] The result of automatic check (that is developed by Alexander Larkin) for this CVE-2024-26821 is: CHECK Maybe valid. Check manually. with impact MODERATE (that is approximation based on flags DISK IMPROVEONLY ; these flags parsed automatically based on patche data). Such automatic check happens only for Low/Moderates (and only when not from reporter, but parsing already existing CVE). Highs always checked manually (I check it myself and then we check it again in Remediation team). In rare cases some of the Moderates could be increased to High later. Note, his has been rejected upstream: "The Linux kernel CVE team has assigned CVE-2024-26821 to this issue. This one probably needs to be disputed as it isn't an actual vulnerability, but rather a fix for the mount_setattr which previously didn't allow reconfiguring the real rootfs similar to what the mount syscall always allowed to do. So it merely brings mount_attr up to par with mount in terms of allowing the real rootfs to be reconfigured. Christian, what do you think ? Yeah, it's not security related at all. It just allows _additional_ functionality. Not sure how that ended up on the CVE list. Thanks for pinging about this! Now rejected, thanks all for reviewing this and letting us know. greg k-h" This CVE has been rejected upstream: https://lore.kernel.org/linux-cve-announce/2024051643-REJECTED-4a96@gregkh/ |