First published: Mon Jun 03 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: fs/9p: only translate RWX permissions for plain 9P2000 Garbage in plain 9P2000's perm bits is allowed through, which causes it to be able to set (among others) the suid bit. This was presumably not the intent since the unix extended bits are handled explicitly and conditionally on .u.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux | 5.10.223-1 5.10.234-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.16-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-36964 has been classified as a high-severity vulnerability affecting the Linux kernel.
To fix CVE-2024-36964, update the Linux kernel to the recommended versions: 5.10.223-1, 5.10.226-1, 6.1.119-1, 6.1.123-1, 6.12.11-1, or 6.12.12-1.
CVE-2024-36964 can allow unauthorized setting of permission bits, potentially enabling a suid bit to be set on files.
CVE-2024-36964 affects Debian's Linux kernel and its associated versions.
CVE-2024-36964 was reported and subsequently resolved in recent updates to the Linux kernel.