Lucene search

K
redhatcveRedhat.comRH:CVE-2024-27055
HistoryMay 01, 2024 - 8:24 p.m.

CVE-2024-27055

2024-05-0120:24:09
redhat.com
access.redhat.com
2
linux kernel
vulnerability
cve-2024-27055
wq_update_node_max_active fix
cpu
oopses
archs
paging request
kernel panic

7 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

10.4%

In the Linux kernel, the following vulnerability has been resolved: workqueue: Don’t call cpumask_test_cpu() with -1 CPU in wq_update_node_max_active() For wq_update_node_max_active(), @off_cpu of -1 indicates that no CPU is going down. The function was incorrectly calling cpumask_test_cpu() with -1 CPU leading to oopses like the following on some archs: Unable to handle kernel paging request at virtual address ffff0002100296e0 … pc : wq_update_node_max_active+0x50/0x1fc lr : wq_update_node_max_active+0x1f0/0x1fc … Call trace: wq_update_node_max_active+0x50/0x1fc apply_wqattrs_commit+0xf0/0x114 apply_workqueue_attrs_locked+0x58/0xa0 alloc_workqueue+0x5ac/0x774 workqueue_init_early+0x460/0x540 start_kernel+0x258/0x684 __primary_switched+0xb8/0xc0 Code: 9100a273 35000d01 53067f00 d0016dc1 (f8607a60) -–[ end trace 0000000000000000 ]— Kernel panic - not syncing: Attempted to kill the idle task! -–[ end Kernel panic - not syncing: Attempted to kill the idle task! ]— Fix it.

7 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

10.4%