Lucene search

K
ubuntucveUbuntu.comUB:CVE-2024-27055
HistoryMay 01, 2024 - 12:00 a.m.

CVE-2024-27055

2024-05-0100:00:00
ubuntu.com
ubuntu.com
7
linux kernel
workqueue
vulnerability

AI Score

6.3

Confidence

Low

EPSS

0

Percentile

10.3%

In the Linux kernel, the following vulnerability has been resolved:
workqueue: Don’t call cpumask_test_cpu() with -1 CPU in
wq_update_node_max_active() For wq_update_node_max_active(), @off_cpu of -1
indicates that no CPU is going down. The function was incorrectly calling
cpumask_test_cpu() with -1 CPU leading to oopses like the following on some
archs: Unable to handle kernel paging request at virtual address
ffff0002100296e0 … pc : wq_update_node_max_active+0x50/0x1fc lr :
wq_update_node_max_active+0x1f0/0x1fc … Call trace:
wq_update_node_max_active+0x50/0x1fc apply_wqattrs_commit+0xf0/0x114
apply_workqueue_attrs_locked+0x58/0xa0 alloc_workqueue+0x5ac/0x774
workqueue_init_early+0x460/0x540 start_kernel+0x258/0x684
__primary_switched+0xb8/0xc0 Code: 9100a273 35000d01 53067f00 d0016dc1
(f8607a60) —[ end trace 0000000000000000 ]— Kernel panic - not syncing:
Attempted to kill the idle task! —[ end Kernel panic - not syncing:
Attempted to kill the idle task! ]— Fix it.

Notes

Author Note
rodrigo-zaiden upstream commit 15930da42f8981dc42c19038042947b475b19f47 was reverted in stable branches because it caused regressions: adc646d21269 reverts in 6.8 and a75ac2693d73 reverts in 6.6. So, it seems like it shouldn’t be backported.

AI Score

6.3

Confidence

Low

EPSS

0

Percentile

10.3%