CVE-2024-27055 (GCVE-0-2024-27055)

Vulnerability from cvelistv5 – Published: 2024-05-01 12:54 – Updated: 2025-03-10 07:42
VLAI?

This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

Show details on NVD website

{
  "containers": {
    "cna": {
      "providerMetadata": {
        "dateUpdated": "2025-03-10T07:42:46.766Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "rejectedReasons": [
        {
          "lang": "en",
          "value": "This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2024-27055",
    "datePublished": "2024-05-01T12:54:52.938Z",
    "dateRejected": "2025-03-10T07:42:46.766Z",
    "dateReserved": "2024-02-19T14:20:24.214Z",
    "dateUpdated": "2025-03-10T07:42:46.766Z",
    "state": "REJECTED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "descriptions": "[{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nworkqueue: Don\u0027t call cpumask_test_cpu() with -1 CPU in wq_update_node_max_active()\\n\\nFor wq_update_node_max_active(), @off_cpu of -1 indicates that no CPU is\\ngoing down. The function was incorrectly calling cpumask_test_cpu() with -1\\nCPU leading to oopses like the following on some archs:\\n\\n  Unable to handle kernel paging request at virtual address ffff0002100296e0\\n  ..\\n  pc : wq_update_node_max_active+0x50/0x1fc\\n  lr : wq_update_node_max_active+0x1f0/0x1fc\\n  ...\\n  Call trace:\\n    wq_update_node_max_active+0x50/0x1fc\\n    apply_wqattrs_commit+0xf0/0x114\\n    apply_workqueue_attrs_locked+0x58/0xa0\\n    alloc_workqueue+0x5ac/0x774\\n    workqueue_init_early+0x460/0x540\\n    start_kernel+0x258/0x684\\n    __primary_switched+0xb8/0xc0\\n  Code: 9100a273 35000d01 53067f00 d0016dc1 (f8607a60)\\n  ---[ end trace 0000000000000000 ]---\\n  Kernel panic - not syncing: Attempted to kill the idle task!\\n  ---[ end Kernel panic - not syncing: Attempted to kill the idle task! ]---\\n\\nFix it.\"}, {\"lang\": \"es\", \"value\": \"En el kernel de Linux, se resolvi\\u00f3 la siguiente vulnerabilidad: cola de trabajo: no llame a cpumask_test_cpu() con -1 CPU en wq_update_node_max_active() Para wq_update_node_max_active(), @off_cpu de -1 indica que no hay ninguna CPU fallando. La funci\\u00f3n llamaba incorrectamente a cpumask_test_cpu() con -1 CPU, lo que provocaba errores como los siguientes en algunos arcos: No se puede manejar la solicitud de paginaci\\u00f3n del kernel en la direcci\\u00f3n virtual ffff0002100296e0 .. pc: wq_update_node_max_active+0x50/0x1fc lr: wq_update_node_max_active+0x1f0/0x1fc .. Seguimiento de llamadas: wq_update_node_max_active+0x50/0x1fc apply_wqattrs_commit+0xf0/0x114 apply_workqueue_attrs_locked+0x58/0xa0 alloc_workqueue+0x5ac/0x774 workqueue_init_early+0x460/0x540 start_kernel+0x258/0x68. 4 __primary_switched+0xb8/0xc0 C\\u00f3digo: 9100a273 35000d01 53067f00 d0016dc1 (f8607a60) -- -[ end trace 0000000000000000 ]--- P\\u00e1nico del kernel - no se sincroniza: \\u00a1Se intent\\u00f3 finalizar la tarea inactiva! ---[ fin del p\\u00e1nico del kernel: no se sincroniza: \\u00a1se intent\\u00f3 finalizar la tarea inactiva! ]--- Arreglalo.\"}]",
      "id": "CVE-2024-27055",
      "lastModified": "2024-11-21T09:03:45.863",
      "published": "2024-05-01T13:15:50.317",
      "references": "[{\"url\": \"https://git.kernel.org/stable/c/15930da42f8981dc42c19038042947b475b19f47\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/38c19c44cc05ec1e84d2e31a9a289b83b6c7ec85\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/7df62b8cca38aa452b508b477b16544cba615084\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/9fc557d489f8163c1aabcb89114b8eba960f4097\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/a75ac2693d734d20724f0e10e039ca85f1fcfc4e\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/adc646d2126988a64234502f579e4bc2b080d7cf\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/15930da42f8981dc42c19038042947b475b19f47\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://git.kernel.org/stable/c/38c19c44cc05ec1e84d2e31a9a289b83b6c7ec85\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://git.kernel.org/stable/c/7df62b8cca38aa452b508b477b16544cba615084\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://git.kernel.org/stable/c/9fc557d489f8163c1aabcb89114b8eba960f4097\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://git.kernel.org/stable/c/a75ac2693d734d20724f0e10e039ca85f1fcfc4e\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://git.kernel.org/stable/c/adc646d2126988a64234502f579e4bc2b080d7cf\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      "vulnStatus": "Awaiting Analysis"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-27055\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-05-01T13:15:50.317\",\"lastModified\":\"2025-03-10T08:15:10.287\",\"vulnStatus\":\"Rejected\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.\"}],\"metrics\":{},\"references\":[]}}",
    "vulnrichment": {
      "containers": "{\"cna\": {\"rejectedReasons\": [{\"lang\": \"en\", \"value\": \"This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.\"}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2025-03-10T07:42:46.766Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-27055\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"state\": \"REJECTED\", \"assignerShortName\": \"Linux\", \"dateReserved\": \"2024-02-19T14:20:24.214Z\", \"datePublished\": \"2024-05-01T12:54:52.938Z\", \"dateUpdated\": \"2025-03-10T07:42:46.766Z\", \"dateRejected\": \"2025-03-10T07:42:46.766Z\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…