In the Linux kernel, the following vulnerability has been resolved:
fs/9p: only translate RWX permissions for plain 9P2000
Garbage in plain 9P2000's perm bits is allowed through, which causes it
to be able to set (among others) the suid bit. This was presumably not
the intent since the unix extended bits are handled explicitly and
conditionally on .u.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
17 Dec 2025, 03:28
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| First Time |
Linux
Debian Debian debian Linux Linux linux Kernel |
|
| References | () https://git.kernel.org/stable/c/157d468e34fdd3cb1ddc07c2be32fb3b02826b02 - Patch | |
| References | () https://git.kernel.org/stable/c/5a605930e19f451294bd838754f7d66c976a8a2c - Patch | |
| References | () https://git.kernel.org/stable/c/ad4f65328661392de74e3608bb736fedf3b67e32 - Patch | |
| References | () https://git.kernel.org/stable/c/ca9b5c81f0c918c63d73d962ed8a8e231f840bc8 - Patch | |
| References | () https://git.kernel.org/stable/c/cd25e15e57e68a6b18dc9323047fe9c68b99290b - Patch | |
| References | () https://git.kernel.org/stable/c/df1962a199783ecd66734d563caf0fedecf08f96 - Patch | |
| References | () https://git.kernel.org/stable/c/e55c601af3b1223a84f9f27f9cdbd2af5e203bf3 - Patch | |
| References | () https://git.kernel.org/stable/c/e90bc596a74bb905e0a45bf346038c3f9d1e868d - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - Third Party Advisory, Mailing List | |
| CWE | NVD-CWE-noinfo | |
| CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:* |
21 Nov 2024, 09:22
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| References | () https://git.kernel.org/stable/c/157d468e34fdd3cb1ddc07c2be32fb3b02826b02 - | |
| References | () https://git.kernel.org/stable/c/5a605930e19f451294bd838754f7d66c976a8a2c - | |
| References | () https://git.kernel.org/stable/c/ad4f65328661392de74e3608bb736fedf3b67e32 - | |
| References | () https://git.kernel.org/stable/c/ca9b5c81f0c918c63d73d962ed8a8e231f840bc8 - | |
| References | () https://git.kernel.org/stable/c/cd25e15e57e68a6b18dc9323047fe9c68b99290b - | |
| References | () https://git.kernel.org/stable/c/df1962a199783ecd66734d563caf0fedecf08f96 - | |
| References | () https://git.kernel.org/stable/c/e55c601af3b1223a84f9f27f9cdbd2af5e203bf3 - | |
| References | () https://git.kernel.org/stable/c/e90bc596a74bb905e0a45bf346038c3f9d1e868d - |
05 Nov 2024, 10:17
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
27 Jun 2024, 12:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
03 Jun 2024, 14:46
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
03 Jun 2024, 08:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-06-03 08:15
Updated : 2025-12-17 03:28
NVD link : CVE-2024-36964
Mitre link : CVE-2024-36964
CVE.ORG link : CVE-2024-36964
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
