In the Linux kernel, the following vulnerability has been resolved:
um: time-travel: fix time corruption
In 'basic' time-travel mode (without =inf-cpu or =ext), we
still get timer interrupts. These can happen at arbitrary
points in time, i.e. while in timer_read(), which pushes
time forward just a little bit. Then, if we happen to get
the interrupt after calculating the new time to push to,
but before actually finishing that, the interrupt will set
the time to a value that's incompatible with the forward,
and we'll crash because time goes backwards when we do the
forwarding.
Fix this by reading the time_travel_time, calculating the
adjustment, and doing the adjustment all with interrupts
disabled.
Metrics
Affected Vendors & Products
References
History
Wed, 11 Sep 2024 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: Linux
Published: 2024-04-02T06:49:11.596Z
Updated: 2024-11-04T14:50:07.336Z
Reserved: 2024-03-06T09:52:12.092Z
Link: CVE-2023-52633
Vulnrichment
Updated: 2024-08-02T23:03:21.364Z
NVD
Status : Awaiting Analysis
Published: 2024-04-02T07:15:41.097
Modified: 2024-04-02T12:50:42.233
Link: CVE-2023-52633
Redhat