Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2024-27055
HistoryMay 01, 2024 - 1:15 p.m.

CVE-2024-27055

2024-05-0113:15:50
Debian Security Bug Tracker
security-tracker.debian.org
9
linux kernel
vulnerability resolved
oopses
kernel panics

6.5 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

10.4%

In the Linux kernel, the following vulnerability has been resolved: workqueue: Don’t call cpumask_test_cpu() with -1 CPU in wq_update_node_max_active() For wq_update_node_max_active(), @off_cpu of -1 indicates that no CPU is going down. The function was incorrectly calling cpumask_test_cpu() with -1 CPU leading to oopses like the following on some archs: Unable to handle kernel paging request at virtual address ffff0002100296e0 … pc : wq_update_node_max_active+0x50/0x1fc lr : wq_update_node_max_active+0x1f0/0x1fc … Call trace: wq_update_node_max_active+0x50/0x1fc apply_wqattrs_commit+0xf0/0x114 apply_workqueue_attrs_locked+0x58/0xa0 alloc_workqueue+0x5ac/0x774 workqueue_init_early+0x460/0x540 start_kernel+0x258/0x684 __primary_switched+0xb8/0xc0 Code: 9100a273 35000d01 53067f00 d0016dc1 (f8607a60) —[ end trace 0000000000000000 ]— Kernel panic - not syncing: Attempted to kill the idle task! —[ end Kernel panic - not syncing: Attempted to kill the idle task! ]— Fix it.

6.5 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

10.4%