
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability in the Linux kernel's tracing/osnoise subsystem was discovered and fixed in September 2024. The issue (CVE-2024-46788) involved improper thread management where the startkthread() and stopthread() code was not consistently executed with the interface_lock held, potentially leading to system crashes (Kernel Git).
The vulnerability occurred when the kthread variable could be unexpectedly changed, causing kthreadstop() to be called on it inappropriately. This could result in mistakenly calling kthreadstop() on a user space thread, forcing it to exit prematurely. The issue manifested as a general protection fault with a null-ptr-deref, potentially leading to system crashes (Kernel Git).
When exploited, this vulnerability could cause a denial of service condition through system crashes. The issue specifically affected the tracing/osnoise subsystem in the Linux kernel, potentially impacting system stability and reliability (Ubuntu Security).
The issue has been fixed by implementing a cpumask to track when kthreads are running and need to be shut down. The fix involves using a cpumask to properly manage thread states and ensure correct shutdown procedures. Users should update their Linux kernel to the patched version (Kernel Git).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."