First published: Tue Jan 21 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: selinux: ignore unknown extended permissions When evaluating extended permissions, ignore unknown permissions instead of calling BUG(). This commit ensures that future permissions can be added without interfering with older kernels.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Kernel-devel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-57931 is generally assessed as low, as it related to the handling of unknown extended permissions in the Linux kernel.
To fix CVE-2024-57931, you should upgrade to the latest stable version of the Linux kernel that includes the relevant patch.
CVE-2024-57931 affects various versions of the Linux kernel that handle extended permissions.
CVE-2024-57931 impacts the SELinux module within the Linux kernel, specifically its treatment of unknown extended permissions.
CVE-2024-57931 is designed to prevent system crashes by ignoring unknown permissions instead of causing a fatal error.