CVE-2024-43882 — Time-of-check Time-of-use (TOCTOU) Race Condition in Linux
Severity
7.0HIGHNVD
OSV8.8OSV7.8OSV7.1OSV5.5
EPSS
0.0%
top 94.61%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedAug 21
Latest updateAug 14
Description
In the Linux kernel, the following vulnerability has been resolved:
exec: Fix ToCToU between perm check and set-uid/gid usage
When opening a file for exec via do_filp_open(), permission checking is
done against the file's metadata at that moment, and on success, a file
pointer is passed back. Much later in the execve() code path, the file
metadata (specifically mode, uid, and gid) is used to determine if/how
to set the uid and gid. However, those values may have changed since the
permissions c…
CVSS vector
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.0 | Impact: 5.9
Affected Packages10 packages
▶CVEListV5linux/linux9167b0b9a0ab7907191523f5a0528e3b9c288e21 — d5c3c7e26275a2d83b894d30f7582a42853a958f+8