In the Linux kernel, the following vulnerability has been resolved:
binder: signal epoll threads of self-work
In (e)poll mode, threads often depend on I/O events to determine when
data is ready for consumption. Within binder, a thread may initiate a
command via BINDER_WRITE_READ without a read buffer and then make use
of epoll_wait() or similar to consume any responses afterwards.
It is then crucial that epoll threads are signaled via wakeup when they
queue their own work. Otherwise, they risk waiting indefinitely for an
event leaving their work unhandled. What is worse, subsequent commands
won't trigger a wakeup either as the thread has pending work.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 09:02
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://git.kernel.org/stable/c/42beab162dcee1e691ee4934292d51581c29df61 - Patch | |
References | () https://git.kernel.org/stable/c/82722b453dc2f967b172603e389ee7dc1b3137cc - Patch | |
References | () https://git.kernel.org/stable/c/90e09c016d72b91e76de25f71c7b93d94cc3c769 - Patch | |
References | () https://git.kernel.org/stable/c/93b372c39c40cbf179e56621e6bc48240943af69 - Patch | |
References | () https://git.kernel.org/stable/c/97830f3c3088638ff90b20dfba2eb4d487bf14d7 - Patch | |
References | () https://git.kernel.org/stable/c/a423042052ec2bdbf1e552e621e6a768922363cc - Patch | |
References | () https://git.kernel.org/stable/c/a7ae586f6f6024f490b8546c8c84670f96bb9b68 - Patch | |
References | () https://git.kernel.org/stable/c/dd64bb8329ce0ea27bc557e4160c2688835402ac - Patch |
05 Nov 2024, 10:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
27 Jun 2024, 12:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
25 Jun 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
17 Apr 2024, 17:49
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
First Time |
Linux linux Kernel
Linux |
|
CWE | NVD-CWE-noinfo | |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
References | () https://git.kernel.org/stable/c/42beab162dcee1e691ee4934292d51581c29df61 - Patch | |
References | () https://git.kernel.org/stable/c/82722b453dc2f967b172603e389ee7dc1b3137cc - Patch | |
References | () https://git.kernel.org/stable/c/90e09c016d72b91e76de25f71c7b93d94cc3c769 - Patch | |
References | () https://git.kernel.org/stable/c/93b372c39c40cbf179e56621e6bc48240943af69 - Patch | |
References | () https://git.kernel.org/stable/c/97830f3c3088638ff90b20dfba2eb4d487bf14d7 - Patch | |
References | () https://git.kernel.org/stable/c/a423042052ec2bdbf1e552e621e6a768922363cc - Patch | |
References | () https://git.kernel.org/stable/c/a7ae586f6f6024f490b8546c8c84670f96bb9b68 - Patch | |
References | () https://git.kernel.org/stable/c/dd64bb8329ce0ea27bc557e4160c2688835402ac - Patch |
11 Mar 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
28 Feb 2024, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
26 Feb 2024, 16:32
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-26 16:28
Updated : 2024-11-21 09:02
NVD link : CVE-2024-26606
Mitre link : CVE-2024-26606
CVE.ORG link : CVE-2024-26606
JSON object : View
Products Affected
linux
- linux_kernel
CWE