CVE-2024-43882Time-of-check Time-of-use (TOCTOU) Race Condition in Linux

Severity
7.0HIGHNVD
OSV8.8OSV7.8OSV7.1OSV5.5
EPSS
0.0%
top 94.61%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 21
Latest updateAug 14

Description

In the Linux kernel, the following vulnerability has been resolved: exec: Fix ToCToU between perm check and set-uid/gid usage When opening a file for exec via do_filp_open(), permission checking is done against the file's metadata at that moment, and on success, a file pointer is passed back. Much later in the execve() code path, the file metadata (specifically mode, uid, and gid) is used to determine if/how to set the uid and gid. However, those values may have changed since the permissions c

CVSS vector

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.0 | Impact: 5.9

Affected Packages10 packages

NVDlinux/linux_kernel4.205.4.282+7
Debianlinux/linux_kernel< 5.10.226-1+3
Ubuntulinux/linux_kernel< 5.4.0-200.220+13
CVEListV5linux/linux9167b0b9a0ab7907191523f5a0528e3b9c288e21d5c3c7e26275a2d83b894d30f7582a42853a958f+8
debiandebian/linux< linux 6.1.106-1 (bookworm)

Patches

🔴Vulnerability Details

23
OSV
Kernel Live Patch Security Notice2025-02-20
OSV
linux-azure-5.15 vulnerabilities2025-01-09
OSV
Kernel Live Patch Security Notice2024-12-19
OSV
linux-gkeop vulnerabilities2024-12-12
OSV
linux, linux-aws, linux-kvm, linux-lts-xenial vulnerabilities2024-12-10

📋Vendor Advisories

24
CISA ICS
Siemens Third-Party Components in SINEC OS2025-08-14
Ubuntu
Kernel Live Patch Security Notice2025-02-20
Ubuntu
Linux kernel (Azure) vulnerabilities2025-01-09
Ubuntu
Kernel Live Patch Security Notice2024-12-19
Ubuntu
Linux kernel (GKE) vulnerabilities2024-12-12