Bug 2292830 (CVE-2024-38394)

Summary: CVE-2024-38394 gnome-settings-daemon: USBGuard bypass
Product: [Other] Security Response Reporter: Patrick Del Bello <pdelbell>
Component: vulnerabilityAssignee: Product Security <prodsec-ir-bot>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedKeywords: Security
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
A flaw was found in gnome-settings-daemon. This vulnerability allows an attacker, via kernel and local access, to access and jeopardize the USB in a Linux environment.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2292831    
Bug Blocks: 2292829    

Description Patrick Del Bello 2024-06-18 03:48:27 UTC
Mismatches in interpreting USB authorization policy between GNOME Settings Daemon (GSD) through 46.0 and the Linux kernel's underlying device matching logic allow a physically proximate attacker to access some unintended Linux kernel USB functionality, such as USB device-specific kernel modules and filesystem implementations. NOTE: the GSD supplier indicates that consideration of a mitigation for this within GSD would be in the context of "a new feature, not a CVE."

https://gitlab.gnome.org/GNOME/gnome-settings-daemon/-/issues/780
https://gitlab.gnome.org/GNOME/gnome-settings-daemon/-/issues/780#note_2047914
https://gitlab.gnome.org/GNOME/gnome-settings-daemon/-/tags
https://pulsesecurity.co.nz/advisories/usbguard-bypass

Comment 1 Patrick Del Bello 2024-06-18 03:49:12 UTC
Created gnome-settings-daemon tracking bugs for this issue:

Affects: fedora-all [bug 2292831]