3 vulnerabilities classified as CWE-368 (上下文切换时的竞争条件). AI Chinese analysis included.
CWE-368 represents a context switching race condition, a logical weakness where a product executes non-atomic actions across security boundaries, allowing attackers to exploit timing gaps. This vulnerability typically arises when a system transitions between contexts, such as a web browser moving from a trusted to an untrusted state. During this brief interval, an adversary can manipulate the environment or modify data, causing the application to misrepresent its behavior or bypass security controls. Developers mitigate this risk by ensuring atomicity in critical operations, effectively preventing context switches during sensitive transitions. Implementing robust locking mechanisms, using thread-safe data structures, and validating state consistency before and after context changes are essential strategies. By eliminating the window of opportunity for race conditions, developers ensure that security boundaries remain intact, thereby preserving the integrity and confidentiality of the application’s execution environment.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2022-21806 | Anker Eufy Homebase 资源管理错误漏洞 — Eufy Homebase 2 | 9.8 | - | 2022-06-17 |
| CVE-2021-21941 | Anker Eufy Homebase 资源管理错误漏洞 — Anker | 8.1 | - | 2021-10-12 |
| CVE-2020-8834 | Linux kernel KVM Power8 conflicting use of HSTATE_HOST_R1 — Linux kernel | 6.5 | Medium | 2020-04-09 |
Vulnerabilities classified as CWE-368 (上下文切换时的竞争条件) represent 3 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.