CVE-2024-36963

7.8 HIGH

📋 TL;DR

A Linux kernel vulnerability in tracefs where file permissions aren't properly reset during remount operations. This allows files with previously modified permissions to retain those permissions even after a system-wide remount, potentially creating privilege escalation opportunities. Affects systems using tracefs with custom permission settings.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Specific affected versions not specified in CVE, but patches available for stable kernel branches
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems where tracefs is mounted and permissions have been modified by users.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Privilege escalation where an attacker gains unauthorized access to tracefs files, potentially enabling kernel information disclosure or manipulation of tracing data.

🟠

Likely Case

Inconsistent file permissions leading to security policy violations, where some files retain old permissions while others are updated during remount.

🟢

If Mitigated

Minimal impact if tracefs isn't used or if no custom permissions were set before remount.

🌐 Internet-Facing: LOW - tracefs is typically not exposed to internet-facing services.
🏢 Internal Only: MEDIUM - Requires local access and specific tracefs usage patterns.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to modify tracefs permissions before remount.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Patches available in stable kernel branches via provided git commits

Vendor Advisory: https://git.kernel.org/stable/c/414fb08628143203d29ccd0264b5a83fb9523c03

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version. 2. Apply kernel patches from git commits. 3. Reboot system to load new kernel.

🔧 Temporary Workarounds

Avoid tracefs permission modifications

linux

Do not modify tracefs file permissions manually to avoid the inconsistent state.

# Avoid using chmod/chown on /sys/kernel/tracing files

Unmount tracefs if not needed

linux

Remove tracefs mount if tracing functionality is not required.

# umount /sys/kernel/tracing

🧯 If You Can't Patch

  • Audit tracefs permissions regularly to ensure no unexpected changes persist
  • Implement strict access controls to prevent unauthorized users from modifying tracefs permissions

🔍 How to Verify

Check if Vulnerable:

Check if tracefs files retain old permissions after remount with different gid/uid options.

Check Version:

# uname -r

Verify Fix Applied:

After patching, verify that all tracefs files update permissions consistently during remount operations.

📡 Detection & Monitoring

Log Indicators:

  • Audit logs showing permission changes to tracefs files
  • System logs showing tracefs remount operations

Network Indicators:

  • None - local filesystem vulnerability

SIEM Query:

Search for chmod/chown operations on /sys/kernel/tracing/* files

🔗 References

📤 Share & Export