
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-41005 is a race condition vulnerability discovered in the Linux kernel's netpoll subsystem. The issue was identified when KCSAN (Kernel Concurrency Sanitizer) detected a data race between netrxaction and netpollsendskb functions. The vulnerability was disclosed and patched in July 2024, affecting various versions of the Linux kernel (Kernel Git).
The vulnerability occurs in the netpollowneractive() function where there is a non-atomic access to napi->pollowner field. The race condition happens when checking if the current CPU is the owner of the lock, with a write operation occurring at 0xffff8881164168b0 by interrupt on CPU 10 (netrxaction) and a concurrent read operation by task 1 on CPU 2 (netpollsend_skb). The value changes from 0x0000000a to 0xffffffff during the race condition (Kernel Git).
The race condition in the netpoll subsystem could potentially lead to system instability or unpredictable behavior when netpoll operations are being performed. This is particularly relevant for systems that rely on netpoll for network debugging or emergency network access (NVD).
The issue has been fixed by implementing an atomic read operation using READONCE() when checking the poll owner in the netpollowner_active() function. The fix has been incorporated into various Linux kernel versions through security updates. Users should update their kernel to a patched version that includes this fix (Red Hat).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."