CVE-2024-26783

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
04/04/2024
Last modified:
03/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> mm/vmscan: fix a bug calling wakeup_kswapd() with a wrong zone index<br /> <br /> With numa balancing on, when a numa system is running where a numa node<br /> doesn&amp;#39;t have its local memory so it has no managed zones, the following<br /> oops has been observed. It&amp;#39;s because wakeup_kswapd() is called with a<br /> wrong zone index, -1. Fixed it by checking the index before calling<br /> wakeup_kswapd().<br /> <br /> &gt; BUG: unable to handle page fault for address: 00000000000033f3<br /> &gt; #PF: supervisor read access in kernel mode<br /> &gt; #PF: error_code(0x0000) - not-present page<br /> &gt; PGD 0 P4D 0<br /> &gt; Oops: 0000 [#1] PREEMPT SMP NOPTI<br /> &gt; CPU: 2 PID: 895 Comm: masim Not tainted 6.6.0-dirty #255<br /> &gt; Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS<br /> &gt; rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014<br /> &gt; RIP: 0010:wakeup_kswapd (./linux/mm/vmscan.c:7812)<br /> &gt; Code: (omitted)<br /> &gt; RSP: 0000:ffffc90004257d58 EFLAGS: 00010286<br /> &gt; RAX: ffffffffffffffff RBX: ffff88883fff0480 RCX: 0000000000000003<br /> &gt; RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff88883fff0480<br /> &gt; RBP: ffffffffffffffff R08: ff0003ffffffffff R09: ffffffffffffffff<br /> &gt; R10: ffff888106c95540 R11: 0000000055555554 R12: 0000000000000003<br /> &gt; R13: 0000000000000000 R14: 0000000000000000 R15: ffff88883fff0940<br /> &gt; FS: 00007fc4b8124740(0000) GS:ffff888827c00000(0000) knlGS:0000000000000000<br /> &gt; CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br /> &gt; CR2: 00000000000033f3 CR3: 000000026cc08004 CR4: 0000000000770ee0<br /> &gt; DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000<br /> &gt; DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400<br /> &gt; PKRU: 55555554<br /> &gt; Call Trace:<br /> &gt; <br /> &gt; ? __die<br /> &gt; ? page_fault_oops<br /> &gt; ? __pte_offset_map_lock<br /> &gt; ? exc_page_fault<br /> &gt; ? asm_exc_page_fault<br /> &gt; ? wakeup_kswapd<br /> &gt; migrate_misplaced_page<br /> &gt; __handle_mm_fault<br /> &gt; handle_mm_fault<br /> &gt; do_user_addr_fault<br /> &gt; exc_page_fault<br /> &gt; asm_exc_page_fault<br /> &gt; RIP: 0033:0x55b897ba0808<br /> &gt; Code: (omitted)<br /> &gt; RSP: 002b:00007ffeefa821a0 EFLAGS: 00010287<br /> &gt; RAX: 000055b89983acd0 RBX: 00007ffeefa823f8 RCX: 000055b89983acd0<br /> &gt; RDX: 00007fc2f8122010 RSI: 0000000000020000 RDI: 000055b89983acd0<br /> &gt; RBP: 00007ffeefa821a0 R08: 0000000000000037 R09: 0000000000000075<br /> &gt; R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000000<br /> &gt; R13: 00007ffeefa82410 R14: 000055b897ba5dd8 R15: 00007fc4b8340000<br /> &gt;

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.18 (including) 6.6.22 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.7.9 (excluding)
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:*