Skip to main content

CVE-2024-36963: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-36963cvecve-2024-36963
Published: Mon Jun 03 2024 (06/03/2024, 07:50:01 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: tracefs: Reset permissions on remount if permissions are options There's an inconsistency with the way permissions are handled in tracefs. Because the permissions are generated when accessed, they default to the root inode's permission if they were never set by the user. If the user sets the permissions, then a flag is set and the permissions are saved via the inode (for tracefs files) or an internal attribute field (for eventfs). But if a remount happens that specify the permissions, all the files that were not changed by the user gets updated, but the ones that were are not. If the user were to remount the file system with a given permission, then all files and directories within that file system should be updated. This can cause security issues if a file's permission was updated but the admin forgot about it. They could incorrectly think that remounting with permissions set would update all files, but miss some. For example: # cd /sys/kernel/tracing # chgrp 1002 current_tracer # ls -l [..] -rw-r----- 1 root root 0 May 1 21:25 buffer_size_kb -rw-r----- 1 root root 0 May 1 21:25 buffer_subbuf_size_kb -r--r----- 1 root root 0 May 1 21:25 buffer_total_size_kb -rw-r----- 1 root lkp 0 May 1 21:25 current_tracer -rw-r----- 1 root root 0 May 1 21:25 dynamic_events -r--r----- 1 root root 0 May 1 21:25 dyn_ftrace_total_info -r--r----- 1 root root 0 May 1 21:25 enabled_functions Where current_tracer now has group "lkp". # mount -o remount,gid=1001 . # ls -l -rw-r----- 1 root tracing 0 May 1 21:25 buffer_size_kb -rw-r----- 1 root tracing 0 May 1 21:25 buffer_subbuf_size_kb -r--r----- 1 root tracing 0 May 1 21:25 buffer_total_size_kb -rw-r----- 1 root lkp 0 May 1 21:25 current_tracer -rw-r----- 1 root tracing 0 May 1 21:25 dynamic_events -r--r----- 1 root tracing 0 May 1 21:25 dyn_ftrace_total_info -r--r----- 1 root tracing 0 May 1 21:25 enabled_functions Everything changed but the "current_tracer". Add a new link list that keeps track of all the tracefs_inodes which has the permission flags that tell if the file/dir should use the root inode's permission or not. Then on remount, clear all the flags so that the default behavior of using the root inode's permission is done for all files and directories.

AI-Powered Analysis

AILast updated: 07/03/2025, 15:12:19 UTC

Technical Analysis

CVE-2024-36963 is a high-severity vulnerability in the Linux kernel's tracefs filesystem, which is used primarily for tracing and debugging kernel events. The issue stems from inconsistent permission handling during remount operations with permission options. Normally, tracefs files and directories inherit permissions dynamically from the root inode unless explicitly set by the user. When a user sets permissions on a tracefs file, a flag is set to preserve those permissions. However, if the filesystem is remounted with new permission options, only files and directories that have not had their permissions explicitly set are updated. Those with user-set permissions retain their old permissions, leading to a mismatch between expected and actual permissions after remount. This behavior can cause security risks because administrators might assume that remounting with new permissions uniformly updates all files, but some files retain outdated permissions, potentially exposing sensitive kernel tracing data or allowing unauthorized access. The vulnerability is rooted in the tracefs inode permission flags and the remount logic. The fix involves tracking all tracefs inodes with explicit permission flags and clearing these flags on remount, ensuring all files revert to default root inode permissions and maintain consistency. The CVSS 3.1 score is 7.8 (high), reflecting the vulnerability's potential to impact confidentiality, integrity, and availability with low attack complexity but requiring local privileges and no user interaction. This vulnerability is particularly relevant for systems where tracefs is mounted and used for kernel tracing, debugging, or performance monitoring, especially in environments with multiple users or complex permission requirements. Since tracefs is a Linux kernel feature, the affected versions correspond to specific kernel commits identified in the report. No known exploits are currently reported in the wild, but the nature of the vulnerability suggests that local attackers with some privileges could exploit it to gain unauthorized access or escalate privileges by manipulating file permissions in tracefs.

Potential Impact

For European organizations, this vulnerability poses a significant risk primarily in environments that rely on Linux systems for critical infrastructure, development, or production workloads where kernel tracing is enabled. Misconfigured or inconsistent permissions in tracefs could lead to unauthorized disclosure of sensitive kernel tracing data, which might include information about system behavior, performance, or security events. This could aid attackers in reconnaissance or privilege escalation efforts. Additionally, incorrect permissions could allow unauthorized modification or interference with tracing files, potentially disrupting monitoring and incident response capabilities. Organizations in sectors such as finance, telecommunications, energy, and government, which often use Linux extensively and require stringent security controls, could face increased risk of insider threats or lateral movement by attackers exploiting this vulnerability. The impact extends to cloud providers and data centers operating Linux-based infrastructure in Europe, where multi-tenant environments and shared resources heighten the importance of strict permission enforcement. Although exploitation requires local access with some privileges, the vulnerability undermines the principle of least privilege and could facilitate privilege escalation or unauthorized access to kernel tracing data, impacting confidentiality, integrity, and availability of systems.

Mitigation Recommendations

To mitigate CVE-2024-36963, European organizations should: 1) Apply the latest Linux kernel patches that address this vulnerability as soon as they become available, ensuring that the tracefs remount permission handling is corrected. 2) Audit and monitor tracefs mount points and permissions regularly to detect inconsistencies or unauthorized changes, using automated scripts or configuration management tools. 3) Restrict local user access to systems where tracefs is mounted, limiting permissions to trusted administrators only, and enforce strict access controls and user privilege separation. 4) Implement kernel hardening and security modules (e.g., SELinux, AppArmor) to enforce mandatory access controls on tracefs files and directories, reducing the risk of unauthorized permission changes. 5) Educate system administrators about the nuances of tracefs permission handling and the importance of verifying permissions after remount operations, avoiding assumptions about uniform permission updates. 6) In environments where tracefs is not required, consider unmounting or disabling it to reduce the attack surface. 7) Integrate vulnerability scanning and compliance checks for kernel versions and configurations into regular security assessments to ensure timely detection and remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-30T15:25:07.081Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f71484d88663aeb0ad

Added to database: 5/20/2025, 6:59:03 PM

Last enriched: 7/3/2025, 3:12:19 PM

Last updated: 7/31/2025, 12:18:16 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats