{"uuid": "da2d6564-7ed5-4a60-93b6-aa581b5fb0a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41005", "type": "seen", "source": "https://t.me/cvedetector/723", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41005 - In the Linux kernel, the following vulnerability h\", \n  \"Content\": \"CVE ID : CVE-2024-41005 \nPublished : July 12, 2024, 1:15 p.m. | 39\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nnetpoll: Fix race condition in netpoll_owner_active  \n  \nKCSAN detected a race condition in netpoll:  \n  \n BUG: KCSAN: data-race in net_rx_action / netpoll_send_skb  \n write (marked) to 0xffff8881164168b0 of 4 bytes by interrupt on cpu 10:  \n net_rx_action (./include/linux/netpoll.h:90 net/core/dev.c:6712 net/core/dev.c:6822)  \n  \n read to 0xffff8881164168b0 of 4 bytes by task 1 on cpu 2:  \n netpoll_send_skb (net/core/netpoll.c:319 net/core/netpoll.c:345 net/core/netpoll.c:393)  \n netpoll_send_udp (net/core/netpoll.c:?)  \n  \n value changed: 0x0000000a -&gt; 0xffffffff  \n  \nThis happens because netpoll_owner_active() needs to check if the  \ncurrent CPU is the owner of the lock, touching napi-&gt;poll_owner  \nnon atomically. The -&gt;poll_owner field contains the current CPU holding  \nthe lock.  \n  \nUse an atomic read to check if the poll owner is the current CPU. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-12T16:04:57.000000Z"}