CVE-2024-36888
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
30/05/2024
Last modified:
01/04/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
workqueue: Fix selection of wake_cpu in kick_pool()<br />
<br />
With cpu_possible_mask=0-63 and cpu_online_mask=0-7 the following<br />
kernel oops was observed:<br />
<br />
smp: Bringing up secondary CPUs ...<br />
smp: Brought up 1 node, 8 CPUs<br />
Unable to handle kernel pointer dereference in virtual kernel address space<br />
Failing address: 0000000000000000 TEID: 0000000000000803<br />
[..]<br />
Call Trace:<br />
arch_vcpu_is_preempted+0x12/0x80<br />
select_idle_sibling+0x42/0x560<br />
select_task_rq_fair+0x29a/0x3b0<br />
try_to_wake_up+0x38e/0x6e0<br />
kick_pool+0xa4/0x198<br />
__queue_work.part.0+0x2bc/0x3a8<br />
call_timer_fn+0x36/0x160<br />
__run_timers+0x1e2/0x328<br />
__run_timer_base+0x5a/0x88<br />
run_timer_softirq+0x40/0x78<br />
__do_softirq+0x118/0x388<br />
irq_exit_rcu+0xc0/0xd8<br />
do_ext_irq+0xae/0x168<br />
ext_int_handler+0xbe/0xf0<br />
psw_idle_exit+0x0/0xc<br />
default_idle_call+0x3c/0x110<br />
do_idle+0xd4/0x158<br />
cpu_startup_entry+0x40/0x48<br />
rest_init+0xc6/0xc8<br />
start_kernel+0x3c4/0x5e0<br />
startup_continue+0x3c/0x50<br />
<br />
The crash is caused by calling arch_vcpu_is_preempted() for an offline<br />
CPU. To avoid this, select the cpu with cpumask_any_and_distribute()<br />
to mask __pod_cpumask with cpu_online_mask. In case no cpu is left in<br />
the pool, skip the assignment.<br />
<br />
tj: This doesn&#39;t fully fix the bug as CPUs can still go down between picking<br />
the target CPU and the wake call. Fixing that likely requires adding<br />
cpu_online() test to either the sched or s390 arch code. However, regardless<br />
of how that is fixed, workqueue shouldn&#39;t be picking a CPU which isn&#39;t<br />
online as that would result in unpredictable and worse behavior.
Impact
Base Score 3.x
6.20
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.6 (including) | 6.6.31 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.8.10 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.9:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.9:rc6:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/57a01eafdcf78f6da34fad9ff075ed5dfdd9f420
- https://git.kernel.org/stable/c/6d559e70b3eb6623935cbe7f94c1912c1099777b
- https://git.kernel.org/stable/c/c57824d4fe07c2131f8c48687cbd5ee2be60c767
- https://git.kernel.org/stable/c/57a01eafdcf78f6da34fad9ff075ed5dfdd9f420
- https://git.kernel.org/stable/c/6d559e70b3eb6623935cbe7f94c1912c1099777b
- https://git.kernel.org/stable/c/c57824d4fe07c2131f8c48687cbd5ee2be60c767



