CVE-2024-26606
binder: signal epoll threads of self-work
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
In the Linux kernel, the following vulnerability has been resolved:
binder: signal epoll threads of self-work
In (e)poll mode, threads often depend on I/O events to determine when
data is ready for consumption. Within binder, a thread may initiate a
command via BINDER_WRITE_READ without a read buffer and then make use
of epoll_wait() or similar to consume any responses afterwards.
It is then crucial that epoll threads are signaled via wakeup when they
queue their own work. Otherwise, they risk waiting indefinitely for an
event leaving their work unhandled. What is worse, subsequent commands
won't trigger a wakeup either as the thread has pending work.
En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: carpeta: señal de epoll de subprocesos de autotrabajo En el modo (e)poll, los subprocesos a menudo dependen de eventos de E/S para determinar cuándo los datos están listos para el consumo. Dentro de Binder, un hilo puede iniciar un comando a través de BINDER_WRITE_READ sin un búfer de lectura y luego hacer uso de epoll_wait() o similar para consumir cualquier respuesta posterior. Entonces es crucial que los subprocesos de epoll sean señalizados mediante activación cuando ponen en cola su propio trabajo. De lo contrario, corren el riesgo de esperar indefinidamente a que ocurra un evento que deje su trabajo sin gestionar. Lo que es peor, los comandos posteriores tampoco activarán una reactivación ya que el hilo tiene trabajo pendiente.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2024-02-19 CVE Reserved
- 2024-02-26 CVE Published
- 2024-04-21 EPSS Updated
- 2024-12-19 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (11)
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 2.6.29 < 4.19.307 Search vendor "Linux" for product "Linux Kernel" and version " >= 2.6.29 < 4.19.307" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 2.6.29 < 5.4.269 Search vendor "Linux" for product "Linux Kernel" and version " >= 2.6.29 < 5.4.269" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 2.6.29 < 5.10.210 Search vendor "Linux" for product "Linux Kernel" and version " >= 2.6.29 < 5.10.210" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 2.6.29 < 5.15.149 Search vendor "Linux" for product "Linux Kernel" and version " >= 2.6.29 < 5.15.149" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 2.6.29 < 6.1.79 Search vendor "Linux" for product "Linux Kernel" and version " >= 2.6.29 < 6.1.79" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 2.6.29 < 6.6.18 Search vendor "Linux" for product "Linux Kernel" and version " >= 2.6.29 < 6.6.18" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 2.6.29 < 6.7.6 Search vendor "Linux" for product "Linux Kernel" and version " >= 2.6.29 < 6.7.6" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 2.6.29 < 6.8 Search vendor "Linux" for product "Linux Kernel" and version " >= 2.6.29 < 6.8" | en |
Affected
|