CVE-2023-52779
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
21/05/2024
Last modified:
02/04/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
fs: Pass AT_GETATTR_NOSEC flag to getattr interface function<br />
<br />
When vfs_getattr_nosec() calls a filesystem&#39;s getattr interface function<br />
then the &#39;nosec&#39; should propagate into this function so that<br />
vfs_getattr_nosec() can again be called from the filesystem&#39;s gettattr<br />
rather than vfs_getattr(). The latter would add unnecessary security<br />
checks that the initial vfs_getattr_nosec() call wanted to avoid.<br />
Therefore, introduce the getattr flag GETATTR_NOSEC and allow to pass<br />
with the new getattr_flags parameter to the getattr interface function.<br />
In overlayfs and ecryptfs use this flag to determine which one of the<br />
two functions to call.<br />
<br />
In a recent code change introduced to IMA vfs_getattr_nosec() ended up<br />
calling vfs_getattr() in overlayfs, which in turn called<br />
security_inode_getattr() on an exiting process that did not have<br />
current->fs set anymore, which then caused a kernel NULL pointer<br />
dereference. With this change the call to security_inode_getattr() can<br />
be avoided, thus avoiding the NULL pointer dereference.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.5 (including) | 6.6.4 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.7:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.7:rc2:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



