Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-44958— sched/smt: Fix unbalance sched_smt_present dec/inc

EPSS 0.02% · P4
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-44958

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
sched/smt: Fix unbalance sched_smt_present dec/inc
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: sched/smt: Fix unbalance sched_smt_present dec/inc I got the following warn report while doing stress test: jump label: negative count! WARNING: CPU: 3 PID: 38 at kernel/jump_label.c:263 static_key_slow_try_dec+0x9d/0xb0 Call Trace: <TASK> __static_key_slow_dec_cpuslocked+0x16/0x70 sched_cpu_deactivate+0x26e/0x2a0 cpuhp_invoke_callback+0x3ad/0x10d0 cpuhp_thread_fun+0x3f5/0x680 smpboot_thread_fn+0x56d/0x8d0 kthread+0x309/0x400 ret_from_fork+0x41/0x70 ret_from_fork_asm+0x1b/0x30 </TASK> Because when cpuset_cpu_inactive() fails in sched_cpu_deactivate(), the cpu offline failed, but sched_smt_present is decremented before calling sched_cpu_deactivate(), it leads to unbalanced dec/inc, so fix it by incrementing sched_smt_present in the error path.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于sched/smt组件存在调度SMT(同时多线程)状态统计不均衡的漏洞。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux c5511d03ec090980732e929c318a7a6374b5550e ~ 2a3548c7ef2e135aee40e7e5e44e7d11b893e7c4 -
LinuxLinux 4.20 -

II. Public POCs for CVE-2024-44958

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-44958

登录查看更多情报信息。

Same Patch Batch · Linux · 2024-09-04 · 58 CVEs total

CVE-2024-44991tcp: prevent concurrent execution of tcp_sk_exit_batch
CVE-2024-45002rtla/osnoise: Prevent NULL dereference in error handling
CVE-2024-45006xhci: Fix Panther point NULL pointer deref at full-speed re-enumeration
CVE-2024-45004KEYS: trusted: dcp: fix leak of blob encryption key
CVE-2024-45003vfs: Don't evict inode under the inode lru traversing context
CVE-2024-45005KVM: s390: fix validity interception issue when gisa is switched off
CVE-2024-44994iommu: Restore lost return in iommu_report_device_fault()
CVE-2024-44993drm/v3d: Fix out-of-bounds read in `v3d_csd_job_run()`
CVE-2024-44992smb/client: avoid possible NULL dereference in cifs_free_subrequest()
CVE-2024-44990bonding: fix null pointer deref in bond_ipsec_offload_ok
CVE-2024-44995net: hns3: fix a deadlock problem when config TC during resetting
CVE-2024-44989bonding: fix xfrm real_dev null pointer dereference
CVE-2024-44988net: dsa: mv88e6xxx: Fix out-of-bound access
CVE-2024-44987ipv6: prevent UAF in ip6_send_skb()
CVE-2024-44986ipv6: fix possible UAF in ip6_finish_output2()
CVE-2024-44985ipv6: prevent possible UAF in ip6_xmit()
CVE-2024-44983netfilter: flowtable: validate vlan header
CVE-2024-44984bnxt_en: Fix double DMA unmapping for XDP_REDIRECT
CVE-2024-44982drm/msm/dpu: cleanup FB if dpu_format_populate_layout fails
CVE-2024-44981workqueue: Fix UBSAN 'subtraction overflow' error in shift_and_mask()

Showing top 20 of 58 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2024-44958

No comments yet


Leave a comment