CVE-2023-52942
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
27/03/2025
Last modified:
28/10/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
cgroup/cpuset: Fix wrong check in update_parent_subparts_cpumask()<br />
<br />
It was found that the check to see if a partition could use up all<br />
the cpus from the parent cpuset in update_parent_subparts_cpumask()<br />
was incorrect. As a result, it is possible to leave parent with no<br />
effective cpu left even if there are tasks in the parent cpuset. This<br />
can lead to system panic as reported in [1].<br />
<br />
Fix this probem by updating the check to fail the enabling the partition<br />
if parent&#39;s effective_cpus is a subset of the child&#39;s cpus_allowed.<br />
<br />
Also record the error code when an error happens in update_prstate()<br />
and add a test case where parent partition and child have the same cpu<br />
list and parent has task. Enabling partition in the child will fail in<br />
this case.<br />
<br />
[1] https://www.spinics.net/lists/cgroups/msg36254.html
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.1 (including) | 6.1.11 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.2:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.2:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.2:rc6:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



