CVE-2024-26783
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
04/04/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
mm/vmscan: fix a bug calling wakeup_kswapd() with a wrong zone index<br />
<br />
With numa balancing on, when a numa system is running where a numa node<br />
doesn&#39;t have its local memory so it has no managed zones, the following<br />
oops has been observed. It&#39;s because wakeup_kswapd() is called with a<br />
wrong zone index, -1. Fixed it by checking the index before calling<br />
wakeup_kswapd().<br />
<br />
> BUG: unable to handle page fault for address: 00000000000033f3<br />
> #PF: supervisor read access in kernel mode<br />
> #PF: error_code(0x0000) - not-present page<br />
> PGD 0 P4D 0<br />
> Oops: 0000 [#1] PREEMPT SMP NOPTI<br />
> CPU: 2 PID: 895 Comm: masim Not tainted 6.6.0-dirty #255<br />
> Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS<br />
> rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014<br />
> RIP: 0010:wakeup_kswapd (./linux/mm/vmscan.c:7812)<br />
> Code: (omitted)<br />
> RSP: 0000:ffffc90004257d58 EFLAGS: 00010286<br />
> RAX: ffffffffffffffff RBX: ffff88883fff0480 RCX: 0000000000000003<br />
> RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff88883fff0480<br />
> RBP: ffffffffffffffff R08: ff0003ffffffffff R09: ffffffffffffffff<br />
> R10: ffff888106c95540 R11: 0000000055555554 R12: 0000000000000003<br />
> R13: 0000000000000000 R14: 0000000000000000 R15: ffff88883fff0940<br />
> FS: 00007fc4b8124740(0000) GS:ffff888827c00000(0000) knlGS:0000000000000000<br />
> CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br />
> CR2: 00000000000033f3 CR3: 000000026cc08004 CR4: 0000000000770ee0<br />
> DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000<br />
> DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400<br />
> PKRU: 55555554<br />
> Call Trace:<br />
> <br />
> ? __die<br />
> ? page_fault_oops<br />
> ? __pte_offset_map_lock<br />
> ? exc_page_fault<br />
> ? asm_exc_page_fault<br />
> ? wakeup_kswapd<br />
> migrate_misplaced_page<br />
> __handle_mm_fault<br />
> handle_mm_fault<br />
> do_user_addr_fault<br />
> exc_page_fault<br />
> asm_exc_page_fault<br />
> RIP: 0033:0x55b897ba0808<br />
> Code: (omitted)<br />
> RSP: 002b:00007ffeefa821a0 EFLAGS: 00010287<br />
> RAX: 000055b89983acd0 RBX: 00007ffeefa823f8 RCX: 000055b89983acd0<br />
> RDX: 00007fc2f8122010 RSI: 0000000000020000 RDI: 000055b89983acd0<br />
> RBP: 00007ffeefa821a0 R08: 0000000000000037 R09: 0000000000000075<br />
> R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000000<br />
> R13: 00007ffeefa82410 R14: 000055b897ba5dd8 R15: 00007fc4b8340000<br />
>
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.18 (including) | 6.6.22 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.7.9 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/2774f256e7c0219e2b0a0894af1c76bdabc4f974
- https://git.kernel.org/stable/c/bdd21eed8b72f9e28d6c279f6db258e090c79080
- https://git.kernel.org/stable/c/d6159bd4c00594249e305bfe02304c67c506264e
- https://git.kernel.org/stable/c/e5ec1c24e71dbf144677a975d6ba91043c2193db
- https://git.kernel.org/stable/c/2774f256e7c0219e2b0a0894af1c76bdabc4f974
- https://git.kernel.org/stable/c/bdd21eed8b72f9e28d6c279f6db258e090c79080
- https://git.kernel.org/stable/c/d6159bd4c00594249e305bfe02304c67c506264e
- https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html



