Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2025-03392

Опубликовано: 13 сент. 2024
Источник: fstec
CVSS3: 4.4
CVSS2: 4.3
EPSS Низкий

Описание

Уязвимость компонентов selinux и smack ядра операционной системы Linux связана с неправильной блокировкой. Эксплуатация уязвимости может позволить нарушителю вызвать отказ в обслуживании

Вендор

Red Hat Inc.
Canonical Ltd.
Сообщество свободного программного обеспечения
Novell Inc.
ООО «Ред Софт»

Наименование ПО

Red Hat Enterprise Linux
Ubuntu
Debian GNU/Linux
SUSE Linux Enterprise High Availability Extension
РЕД ОС
SUSE Linux Enterprise Server for SAP Applications
SUSE Linux Enterprise High Performance Computing
SUSE Linux Enterprise Micro
Suse Linux Enterprise Server
SUSE Enterprise Storage
SUSE Linux Enterprise Live Patching
SUSE Liberty Linux
Suse Linux Enterprise Desktop
SUSE Linux Enterprise Module for Basesystem
SUSE Linux Enterprise Workstation Extension
OpenSUSE Leap
SUSE Linux Enterprise Module for Development Tools
SUSE Linux Enterprise Module for Public Cloud
SUSE Real Time Module
Linux

Версия ПО

8 (Red Hat Enterprise Linux)
20.04 LTS (Ubuntu)
11 (Debian GNU/Linux)
12 (Debian GNU/Linux)
15 SP3 (SUSE Linux Enterprise High Availability Extension)
7.3 (РЕД ОС)
15 SP3 (SUSE Linux Enterprise Server for SAP Applications)
15 SP2 (SUSE Linux Enterprise Server for SAP Applications)
15 SP2-LTSS (SUSE Linux Enterprise High Performance Computing)
5.1 (SUSE Linux Enterprise Micro)
5.2 (SUSE Linux Enterprise Micro)
22.04 LTS (Ubuntu)
9 (Red Hat Enterprise Linux)
15 SP2-LTSS (Suse Linux Enterprise Server)
7.1 (SUSE Enterprise Storage)
15 SP2 (SUSE Linux Enterprise High Availability Extension)
15 SP2 (SUSE Linux Enterprise Live Patching)
15 SP3 (SUSE Linux Enterprise Live Patching)
15 SP3-LTSS (Suse Linux Enterprise Server)
15 SP3-LTSS (SUSE Linux Enterprise High Performance Computing)
9 (SUSE Liberty Linux)
8 (SUSE Liberty Linux)
15 SP6 (Suse Linux Enterprise Desktop)
15 SP6 (SUSE Linux Enterprise Server for SAP Applications)
15 SP6 (SUSE Linux Enterprise High Performance Computing)
15 SP6 (SUSE Linux Enterprise Module for Basesystem)
24.04 LTS (Ubuntu)
15 SP6 (SUSE Linux Enterprise Workstation Extension)
15.6 (OpenSUSE Leap)
15 SP6 (SUSE Linux Enterprise Module for Development Tools)
15 SP6 (SUSE Linux Enterprise High Availability Extension)
15 SP6 (SUSE Linux Enterprise Live Patching)
15 SP6 (SUSE Linux Enterprise Module for Public Cloud)
15 SP6 (SUSE Real Time Module)
24.10 (Ubuntu)
9.4 Extended Update Support (Red Hat Enterprise Linux)
до 6.10.8 (Linux)
до 6.11 rc6 (Linux)
до 6.6.49 (Linux)

Тип ПО

Операционная система
Прикладное ПО информационных систем

Операционные системы и аппаратные платформы

Red Hat Inc. Red Hat Enterprise Linux 8
Canonical Ltd. Ubuntu 20.04 LTS
Сообщество свободного программного обеспечения Debian GNU/Linux 11
Сообщество свободного программного обеспечения Debian GNU/Linux 12
ООО «Ред Софт» РЕД ОС 7.3
Novell Inc. SUSE Linux Enterprise Server for SAP Applications 15 SP3
Novell Inc. SUSE Linux Enterprise Server for SAP Applications 15 SP2
Canonical Ltd. Ubuntu 22.04 LTS
Red Hat Inc. Red Hat Enterprise Linux 9
Novell Inc. Suse Linux Enterprise Server 15 SP2-LTSS
Novell Inc. Suse Linux Enterprise Server 15 SP3-LTSS
Novell Inc. SUSE Liberty Linux 9
Novell Inc. SUSE Liberty Linux 8
Novell Inc. Suse Linux Enterprise Desktop 15 SP6
Novell Inc. SUSE Linux Enterprise Server for SAP Applications 15 SP6
Canonical Ltd. Ubuntu 24.04 LTS
Novell Inc. OpenSUSE Leap 15.6
Canonical Ltd. Ubuntu 24.10
Red Hat Inc. Red Hat Enterprise Linux 9.4 Extended Update Support
Сообщество свободного программного обеспечения Linux до 6.10.8
Сообщество свободного программного обеспечения Linux до 6.11 rc6
Сообщество свободного программного обеспечения Linux до 6.6.49

Уровень опасности уязвимости

Средний уровень опасности (базовая оценка CVSS 2.0 составляет 4,3)
Средний уровень опасности (базовая оценка CVSS 3.0 составляет 4,4)

Возможные меры по устранению уязвимости

В условиях отсутствия обновлений безопасности от производителя рекомендуется придерживаться "Рекомендаций по безопасной настройке операционных систем LINUX", изложенных в методическом документе ФСТЭК России, утверждённом 25 декабря 2022 года.
Использование рекомендаций:
Для Linux:
https://git.kernel.org/stable/c/459584258d47ec3cc6245a82e8a49c9d08eb8b57
https://git.kernel.org/stable/c/f71ec019257ba4f7ab198bd948c5902a207bad96
https://git.kernel.org/stable/c/76a0e79bc84f466999fa501fce5bf7a07641b8a7
Для РедОС:
http://repo.red-soft.ru/redos/7.3c/x86_64/updates/
Для программных продуктов Red Hat Inc.:
https://access.redhat.com/security/cve/CVE-2024-46695
Для программных продуктов Novell Inc.:
https://www.suse.com/security/cve/CVE-2024-46695.html
Для программных продуктов Debian GNU/Linux:
https://security-tracker.debian.org/tracker/CVE-2024-46695
Для программных продуктов Ubuntu:
https://ubuntu.com/security/CVE-2024-46695

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 4%
0.0002
Низкий

4.4 Medium

CVSS3

4.3 Medium

CVSS2

Связанные уязвимости

CVSS3: 4.4
ubuntu
9 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: selinux,smack: don't bypass permissions check in inode_setsecctx hook Marek Gresko reports that the root user on an NFS client is able to change the security labels on files on an NFS filesystem that is exported with root squashing enabled. The end of the kerneldoc comment for __vfs_setxattr_noperm() states: * This function requires the caller to lock the inode's i_mutex before it * is executed. It also assumes that the caller will make the appropriate * permission checks. nfsd_setattr() does do permissions checking via fh_verify() and nfsd_permission(), but those don't do all the same permissions checks that are done by security_inode_setxattr() and its related LSM hooks do. Since nfsd_setattr() is the only consumer of security_inode_setsecctx(), simplest solution appears to be to replace the call to __vfs_setxattr_noperm() with a call to __vfs_setxattr_locked(). This fixes the above issue and has the add...

CVSS3: 6.3
redhat
9 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: selinux,smack: don't bypass permissions check in inode_setsecctx hook Marek Gresko reports that the root user on an NFS client is able to change the security labels on files on an NFS filesystem that is exported with root squashing enabled. The end of the kerneldoc comment for __vfs_setxattr_noperm() states: * This function requires the caller to lock the inode's i_mutex before it * is executed. It also assumes that the caller will make the appropriate * permission checks. nfsd_setattr() does do permissions checking via fh_verify() and nfsd_permission(), but those don't do all the same permissions checks that are done by security_inode_setxattr() and its related LSM hooks do. Since nfsd_setattr() is the only consumer of security_inode_setsecctx(), simplest solution appears to be to replace the call to __vfs_setxattr_noperm() with a call to __vfs_setxattr_locked(). This fixes the above issue and has the added ben...

CVSS3: 4.4
nvd
9 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: selinux,smack: don't bypass permissions check in inode_setsecctx hook Marek Gresko reports that the root user on an NFS client is able to change the security labels on files on an NFS filesystem that is exported with root squashing enabled. The end of the kerneldoc comment for __vfs_setxattr_noperm() states: * This function requires the caller to lock the inode's i_mutex before it * is executed. It also assumes that the caller will make the appropriate * permission checks. nfsd_setattr() does do permissions checking via fh_verify() and nfsd_permission(), but those don't do all the same permissions checks that are done by security_inode_setxattr() and its related LSM hooks do. Since nfsd_setattr() is the only consumer of security_inode_setsecctx(), simplest solution appears to be to replace the call to __vfs_setxattr_noperm() with a call to __vfs_setxattr_locked(). This fixes the above issue and has the add

CVSS3: 4.4
msrc
8 месяцев назад

Описание отсутствует

CVSS3: 4.4
debian
9 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: s ...

EPSS

Процентиль: 4%
0.0002
Низкий

4.4 Medium

CVSS3

4.3 Medium

CVSS2