CVE-2024-44968Time-of-check Time-of-use (TOCTOU) Race Condition in Linux

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 89.29%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 4

Description

In the Linux kernel, the following vulnerability has been resolved: tick/broadcast: Move per CPU pointer access into the atomic section The recent fix for making the take over of the broadcast timer more reliable retrieves a per CPU pointer in preemptible context. This went unnoticed as compilers hoist the access into the non-preemptible region where the pointer is actually used. But of course it's valid that the compiler keeps it at the place where the code puts it which rightfully triggers:

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages5 packages

NVDlinux/linux_kernel6.1.1036.1.105+3
Debianlinux/linux_kernel< 5.10.226-1+3
CVEListV5linux/linuxdfe19aa91378972f10530635ad83b2d77f481044f54abf332a2bc0413cfa8bd6a8511f7aa99faea0+10
debiandebian/linux< linux 6.1.106-1 (bookworm)
debiandebian/linux-6.1< linux 6.1.106-1 (bookworm)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-285g-gc96-4xjh: In the Linux kernel, the following vulnerability has been resolved: tick/broadcast: Move per CPU pointer access into the atomic section The recent f2024-09-04
OSV
CVE-2024-44968: In the Linux kernel, the following vulnerability has been resolved: tick/broadcast: Move per CPU pointer access into the atomic section The recent fix2024-09-04

📋Vendor Advisories

2
Red Hat
kernel: tick/broadcast: Move per CPU pointer access into the atomic section2024-09-04
Debian
CVE-2024-44968: linux - In the Linux kernel, the following vulnerability has been resolved: tick/broadc...2024