CVE-2024-26645
CVE-2024-26645: A race condition vulnerability exists in the Linux kernel's tracing functionality, specifically when inserting elements into the tracing_map. This flaw can lead to unexpected warnings about duplicate histogram entries on multi-processor AArch64 systems, triggered by parallel execution of tracing commands and stress tests. The issue arises from CPU reordering of writes in the __tracing_map_insert() function.
The vulnerability allows a race condition where a CPU might incorrectly determine that a new key doesn't match an already present val->key. While the CVSS score is 0, indicating a low quantitative impact, the SOCRadar Vulnerability Risk Score (SVRS) is 30, suggesting a moderate level of risk due to the potential for system instability and logging errors, especially in high-performance environments using kernel tracing features. This means it's important to apply the patch that ensures visibility when inserting an element into the tracing_map function to avoid potential instability. The update should be implemented to prevent diagnostic inaccuracies.
Indicators of Compromise
Exploits
News
Social Media
Affected Software
References
CWE Details
CVE Radar
Real-time CVE Intelligence & Vulnerability Management Platform
CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.