VULNERABILITY

Ubuntu: (Multiple Advisories) (CVE-2024-57977): Linux kernel vulnerabilities

Try Surface Command Get a continuous 360° view of your attack surface
Back to Search

Ubuntu: (Multiple Advisories) (CVE-2024-57977): Linux kernel vulnerabilities

Severity
5
CVSS
(AV:L/AC:L/Au:S/C:N/I:N/A:C)
Published
02/27/2025
Created
05/21/2025
Added
05/20/2025
Modified
05/28/2025

Description

In the Linux kernel, the following vulnerability has been resolved: memcg: fix soft lockup in the OOM process A soft lockup issue was found in the product with about 56,000 tasks were in the OOM cgroup, it was traversing them when the soft lockup was triggered. watchdog: BUG: soft lockup - CPU#2 stuck for 23s! [VM Thread:1503066] CPU: 2 PID: 1503066 Comm: VM Thread Kdump: loaded Tainted: G Hardware name: Huawei Cloud OpenStack Nova, BIOS RIP: 0010:console_unlock+0x343/0x540 RSP: 0000:ffffb751447db9a0 EFLAGS: 00000247 ORIG_RAX: ffffffffffffff13 RAX: 0000000000000001 RBX: 0000000000000000 RCX: 00000000ffffffff RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000247 RBP: ffffffffafc71f90 R08: 0000000000000000 R09: 0000000000000040 R10: 0000000000000080 R11: 0000000000000000 R12: ffffffffafc74bd0 R13: ffffffffaf60a220 R14: 0000000000000247 R15: 0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f2fe6ad91f0 CR3: 00000004b2076003 CR4: 0000000000360ee0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: vprintk_emit+0x193/0x280 printk+0x52/0x6e dump_task+0x114/0x130 mem_cgroup_scan_tasks+0x76/0x100 dump_header+0x1fe/0x210 oom_kill_process+0xd1/0x100 out_of_memory+0x125/0x570 mem_cgroup_out_of_memory+0xb5/0xd0 try_charge+0x720/0x770 mem_cgroup_try_charge+0x86/0x180 mem_cgroup_try_charge_delay+0x1c/0x40 do_anonymous_page+0xb5/0x390 handle_mm_fault+0xc4/0x1f0 This is because thousands of processes are in the OOM cgroup, it takes a long time to traverse all of them. As a result, this lead to soft lockup in the OOM process. To fix this issue, call 'cond_resched' in the 'mem_cgroup_scan_tasks' function per 1000 iterations. For global OOM, call 'touch_softlockup_watchdog' per 1000 iterations to avoid this issue.

Solution(s)

  • ubuntu-upgrade-linux-image-5-15-0-1037-nvidia-tegra
  • ubuntu-upgrade-linux-image-5-15-0-1037-nvidia-tegra-rt
  • ubuntu-upgrade-linux-image-5-15-0-1066-gkeop
  • ubuntu-upgrade-linux-image-5-15-0-1076-ibm
  • ubuntu-upgrade-linux-image-5-15-0-1077-intel-iot-realtime
  • ubuntu-upgrade-linux-image-5-15-0-1078-nvidia
  • ubuntu-upgrade-linux-image-5-15-0-1078-nvidia-lowlatency
  • ubuntu-upgrade-linux-image-5-15-0-1079-intel-iotg
  • ubuntu-upgrade-linux-image-5-15-0-1080-kvm
  • ubuntu-upgrade-linux-image-5-15-0-1081-gke
  • ubuntu-upgrade-linux-image-5-15-0-1081-oracle
  • ubuntu-upgrade-linux-image-5-15-0-1083-gcp
  • ubuntu-upgrade-linux-image-5-15-0-1083-gcp-fips
  • ubuntu-upgrade-linux-image-5-15-0-1084-aws-fips
  • ubuntu-upgrade-linux-image-5-15-0-1084-realtime
  • ubuntu-upgrade-linux-image-5-15-0-1089-azure
  • ubuntu-upgrade-linux-image-5-15-0-1089-azure-fips
  • ubuntu-upgrade-linux-image-5-15-0-140-fips
  • ubuntu-upgrade-linux-image-5-15-0-140-generic
  • ubuntu-upgrade-linux-image-5-15-0-140-generic-64k
  • ubuntu-upgrade-linux-image-5-15-0-140-generic-lpae
  • ubuntu-upgrade-linux-image-5-15-0-140-lowlatency
  • ubuntu-upgrade-linux-image-5-15-0-140-lowlatency-64k
  • ubuntu-upgrade-linux-image-5-4-0-1064-xilinx-zynqmp
  • ubuntu-upgrade-linux-image-5-4-0-1092-ibm
  • ubuntu-upgrade-linux-image-5-4-0-1105-bluefield
  • ubuntu-upgrade-linux-image-5-4-0-1133-kvm
  • ubuntu-upgrade-linux-image-5-4-0-1144-oracle
  • ubuntu-upgrade-linux-image-5-4-0-1149-gcp
  • ubuntu-upgrade-linux-image-5-4-0-1149-gcp-fips
  • ubuntu-upgrade-linux-image-5-4-0-1151-azure
  • ubuntu-upgrade-linux-image-5-4-0-1151-azure-fips
  • ubuntu-upgrade-linux-image-5-4-0-216-generic
  • ubuntu-upgrade-linux-image-5-4-0-216-generic-lpae
  • ubuntu-upgrade-linux-image-5-4-0-216-lowlatency
  • ubuntu-upgrade-linux-image-6-11-0-1010-realtime
  • ubuntu-upgrade-linux-image-6-11-0-1013-raspi
  • ubuntu-upgrade-linux-image-6-11-0-1014-aws
  • ubuntu-upgrade-linux-image-6-11-0-1015-azure
  • ubuntu-upgrade-linux-image-6-11-0-1015-azure-fde
  • ubuntu-upgrade-linux-image-6-11-0-1015-gcp
  • ubuntu-upgrade-linux-image-6-11-0-1015-gcp-64k
  • ubuntu-upgrade-linux-image-6-11-0-1022-oem
  • ubuntu-upgrade-linux-image-6-11-0-26-generic
  • ubuntu-upgrade-linux-image-6-11-0-26-generic-64k
  • ubuntu-upgrade-linux-image-aws
  • ubuntu-upgrade-linux-image-aws-fips
  • ubuntu-upgrade-linux-image-azure
  • ubuntu-upgrade-linux-image-azure-cvm
  • ubuntu-upgrade-linux-image-azure-fde
  • ubuntu-upgrade-linux-image-azure-fips
  • ubuntu-upgrade-linux-image-azure-lts-20-04
  • ubuntu-upgrade-linux-image-azure-lts-22-04
  • ubuntu-upgrade-linux-image-bluefield
  • ubuntu-upgrade-linux-image-fips
  • ubuntu-upgrade-linux-image-gcp
  • ubuntu-upgrade-linux-image-gcp-64k
  • ubuntu-upgrade-linux-image-gcp-fips
  • ubuntu-upgrade-linux-image-gcp-lts-20-04
  • ubuntu-upgrade-linux-image-gcp-lts-22-04
  • ubuntu-upgrade-linux-image-generic
  • ubuntu-upgrade-linux-image-generic-64k
  • ubuntu-upgrade-linux-image-generic-64k-hwe-24-04
  • ubuntu-upgrade-linux-image-generic-hwe-18-04
  • ubuntu-upgrade-linux-image-generic-hwe-24-04
  • ubuntu-upgrade-linux-image-generic-lpae
  • ubuntu-upgrade-linux-image-gke
  • ubuntu-upgrade-linux-image-gke-5-15
  • ubuntu-upgrade-linux-image-gkeop
  • ubuntu-upgrade-linux-image-gkeop-5-15
  • ubuntu-upgrade-linux-image-ibm
  • ubuntu-upgrade-linux-image-ibm-lts-20-04
  • ubuntu-upgrade-linux-image-intel-iot-realtime
  • ubuntu-upgrade-linux-image-intel-iotg
  • ubuntu-upgrade-linux-image-kvm
  • ubuntu-upgrade-linux-image-lowlatency
  • ubuntu-upgrade-linux-image-lowlatency-64k
  • ubuntu-upgrade-linux-image-lowlatency-64k-hwe-20-04
  • ubuntu-upgrade-linux-image-lowlatency-hwe-18-04
  • ubuntu-upgrade-linux-image-lowlatency-hwe-20-04
  • ubuntu-upgrade-linux-image-nvidia
  • ubuntu-upgrade-linux-image-nvidia-lowlatency
  • ubuntu-upgrade-linux-image-nvidia-tegra
  • ubuntu-upgrade-linux-image-nvidia-tegra-rt
  • ubuntu-upgrade-linux-image-oem
  • ubuntu-upgrade-linux-image-oem-24-04b
  • ubuntu-upgrade-linux-image-oem-osp1
  • ubuntu-upgrade-linux-image-oracle
  • ubuntu-upgrade-linux-image-oracle-lts-20-04
  • ubuntu-upgrade-linux-image-oracle-lts-22-04
  • ubuntu-upgrade-linux-image-raspi
  • ubuntu-upgrade-linux-image-realtime
  • ubuntu-upgrade-linux-image-snapdragon-hwe-18-04
  • ubuntu-upgrade-linux-image-virtual
  • ubuntu-upgrade-linux-image-virtual-hwe-18-04
  • ubuntu-upgrade-linux-image-virtual-hwe-24-04
  • ubuntu-upgrade-linux-image-xilinx-zynqmp

insightVM

Advanced vulnerability management analytics and reporting.
Key Features
  • Lightweight Endpoint Agent
  • Live Dashboards
  • Real Risk Prioritization
  • IT-Integrated Remediation Projects
  • Cloud, Virtual, and Container Assessment
  • Integrated Threat Feeds
  • Easy-to-Use RESTful API
  • Automation-Assisted Patching
  • Automated Containment
Free InsightVM Trial View All Features

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;