We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-52942

cgroup/cpuset: Fix wrong check in update_parent_subparts_cpumask()



Description

In the Linux kernel, the following vulnerability has been resolved: cgroup/cpuset: Fix wrong check in update_parent_subparts_cpumask() It was found that the check to see if a partition could use up all the cpus from the parent cpuset in update_parent_subparts_cpumask() was incorrect. As a result, it is possible to leave parent with no effective cpu left even if there are tasks in the parent cpuset. This can lead to system panic as reported in [1]. Fix this probem by updating the check to fail the enabling the partition if parent's effective_cpus is a subset of the child's cpus_allowed. Also record the error code when an error happens in update_prstate() and add a test case where parent partition and child have the same cpu list and parent has task. Enabling partition in the child will fail in this case. [1] https://www.spinics.net/lists/cgroups/msg36254.html

Reserved 2024-08-21 | Published 2025-03-27 | Updated 2025-05-04 | Assigner Linux

Product status

Default status
unaffected

f0af1bfc27b52a4d42510051154c61bd176a8f06 before a2ab7f2cf5ef8f0c6212a246e681d1fe358cec1f
affected

f0af1bfc27b52a4d42510051154c61bd176a8f06 before e5ae8803847b80fe9d744a3174abe2b7bfed222a
affected

Default status
affected

6.1
affected

Any version before 6.1
unaffected

6.1.11
unaffected

6.2
unaffected

References

git.kernel.org/...c/a2ab7f2cf5ef8f0c6212a246e681d1fe358cec1f

git.kernel.org/...c/e5ae8803847b80fe9d744a3174abe2b7bfed222a

cve.org (CVE-2023-52942)

nvd.nist.gov (CVE-2023-52942)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2023-52942

Support options

Helpdesk Chat, Email, Knowledgebase