Skip to content

In the Linux kernel, the following vulnerability has been...

Unreviewed Published Aug 17, 2024 to the GitHub Advisory Database • Updated Aug 19, 2024

Package

No package listedSuggest a package

Affected versions

Unknown

Patched versions

Unknown

Description

In the Linux kernel, the following vulnerability has been resolved:

landlock: Don't lose track of restrictions on cred_transfer

When a process' cred struct is replaced, this almost always invokes
the cred_prepare LSM hook; but in one special case (when
KEYCTL_SESSION_TO_PARENT updates the parent's credentials), the
cred_transfer LSM hook is used instead. Landlock only implements the
cred_prepare hook, not cred_transfer, so KEYCTL_SESSION_TO_PARENT causes
all information on Landlock restrictions to be lost.

This basically means that a process with the ability to use the fork()
and keyctl() syscalls can get rid of all Landlock restrictions on
itself.

Fix it by adding a cred_transfer hook that does the same thing as the
existing cred_prepare hook. (Implemented by having hook_cred_prepare()
call hook_cred_transfer() so that the two functions are less likely to
accidentally diverge in the future.)

References

Published by the National Vulnerability Database Aug 17, 2024
Published to the GitHub Advisory Database Aug 17, 2024
Last updated Aug 19, 2024

Severity

Unknown

EPSS score

0.044%
(14th percentile)

Weaknesses

No CWEs

CVE ID

CVE-2024-42318

GHSA ID

GHSA-g9x3-hhpq-jcqm

Source code

No known source code

Dependabot alerts are not supported on this advisory because it does not have a package from a supported ecosystem with an affected and fixed version.

Learn more about GitHub language support

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.