|
Bugzilla – Full Text Bug Listing |
| Summary: | VUL-0: REJECTED: CVE-2024-26821: kernel: fs: relax mount_setattr() permission checks | ||
|---|---|---|---|
| Product: | [Novell Products] SUSE Security Incidents | Reporter: | SMASH SMASH <smash_bz> |
| Component: | Incidents | Assignee: | Security Team bot <security-team> |
| Status: | RESOLVED INVALID | QA Contact: | Security Team bot <security-team> |
| Severity: | Normal | ||
| Priority: | P3 - Medium | CC: | ailiopoulos, jack, mhocko, osalvador, rgoldwyn, thomas.leroy |
| Version: | unspecified | ||
| Target Milestone: | --- | ||
| Hardware: | Other | ||
| OS: | Other | ||
| URL: | https://smash.suse.de/issue/402309/ | ||
| Whiteboard: | |||
| Found By: | Security Response Team | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
|
Description
SMASH SMASH
2024-04-18 12:56:15 UTC
I'm not sure of the security implication of this one. It seems that it can only crash a booting kernel Yes, this problem is of the type: New API (i.e. mount_setattr(2)) doesn't support what the old API did support (i.e. mount(2)). Thus the new API is not a complete replacement of the old API and someone actually cared so let's fix that. I agree that there's no security implication at all. It is now rejected [1], assigning back to sec. [1] https://lore.kernel.org/all/2024051606-imaging-entrench-b327@gregkh/ Thanks everyone for the help. Closing |