๐Ÿ” CVE Alert

CVE-2024-57917

UNKNOWN 0.0

topology: Keep the cpumask unchanged when printing cpumap

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: topology: Keep the cpumask unchanged when printing cpumap During fuzz testing, the following warning was discovered: different return values (15 and 11) from vsnprintf("%*pbl ", ...) test:keyward is WARNING in kvasprintf WARNING: CPU: 55 PID: 1168477 at lib/kasprintf.c:30 kvasprintf+0x121/0x130 Call Trace: kvasprintf+0x121/0x130 kasprintf+0xa6/0xe0 bitmap_print_to_buf+0x89/0x100 core_siblings_list_read+0x7e/0xb0 kernfs_file_read_iter+0x15b/0x270 new_sync_read+0x153/0x260 vfs_read+0x215/0x290 ksys_read+0xb9/0x160 do_syscall_64+0x56/0x100 entry_SYSCALL_64_after_hwframe+0x78/0xe2 The call trace shows that kvasprintf() reported this warning during the printing of core_siblings_list. kvasprintf() has several steps: (1) First, calculate the length of the resulting formatted string. (2) Allocate a buffer based on the returned length. (3) Then, perform the actual string formatting. (4) Check whether the lengths of the formatted strings returned in steps (1) and (2) are consistent. If the core_cpumask is modified between steps (1) and (3), the lengths obtained in these two steps may not match. Indeed our test includes cpu hotplugging, which should modify core_cpumask while printing. To fix this issue, cache the cpumask into a temporary variable before calling cpumap_print_{list, cpumask}_to_buf(), to keep it unchanged during the printing process.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Jan 19, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
bb9ec13d156e85dfd6a8afd0bb61ccf5736ed257 < 1c7818e2746e747838a3de1687e89eac7b947f08 bb9ec13d156e85dfd6a8afd0bb61ccf5736ed257 < ca47e933a900492d89dcf5db18a99c28bd4a742d bb9ec13d156e85dfd6a8afd0bb61ccf5736ed257 < b02cf1d27e460ab2b3e1c8c9ce472d562cad2e8d bb9ec13d156e85dfd6a8afd0bb61ccf5736ed257 < 360596e7fe319a5db1b5fb34a3952862ae53c924 bb9ec13d156e85dfd6a8afd0bb61ccf5736ed257 < cbd399f78e23ad4492c174fc5e6b3676dba74a52
Linux / Linux
5.15

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/1c7818e2746e747838a3de1687e89eac7b947f08 git.kernel.org: https://git.kernel.org/stable/c/ca47e933a900492d89dcf5db18a99c28bd4a742d git.kernel.org: https://git.kernel.org/stable/c/b02cf1d27e460ab2b3e1c8c9ce472d562cad2e8d git.kernel.org: https://git.kernel.org/stable/c/360596e7fe319a5db1b5fb34a3952862ae53c924 git.kernel.org: https://git.kernel.org/stable/c/cbd399f78e23ad4492c174fc5e6b3676dba74a52 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html