First published: Wed Jun 19 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: ALSA: timer: Set lower bound of start tick time Currently ALSA timer doesn't have the lower limit of the start tick time, and it allows a very small size, e.g. 1 tick with 1ns resolution for hrtimer. Such a situation may lead to an unexpected RCU stall, where the callback repeatedly queuing the expire update, as reported by fuzzer. This patch introduces a sanity check of the timer start tick time, so that the system returns an error when a too small start size is set. As of this patch, the lower limit is hard-coded to 100us, which is small enough but can still work somehow.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <4.19.316 | 4.19.316 |
redhat/kernel | <5.4.278 | 5.4.278 |
redhat/kernel | <5.10.219 | 5.10.219 |
redhat/kernel | <5.15.161 | 5.15.161 |
redhat/kernel | <6.1.93 | 6.1.93 |
redhat/kernel | <6.6.33 | 6.6.33 |
redhat/kernel | <6.9.3 | 6.9.3 |
redhat/kernel | <6.10 | 6.10 |
debian/linux | 5.10.223-1 5.10.234-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.16-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-38618 is classified as a moderate severity vulnerability in the Linux kernel.
To fix CVE-2024-38618, update the Linux kernel to versions 4.19.316, 5.4.278, 5.10.219, 5.15.161, 6.1.93, 6.6.33, 6.9.3, or 6.10 as per the advisories.
The affected versions of the Linux kernel are prior to 4.19.316, 5.4.278, 5.10.219, 5.15.161, 6.1.93, 6.6.33, 6.9.3, and 6.10.
CVE-2024-38618 impacts the ALSA timer component of the Linux kernel.
There are currently no known workarounds for CVE-2024-38618, and patching is the recommended approach.