vulnerability

Red Hat: CVE-2023-52942: kernel: cgroup/cpuset: Fix wrong check in update_parent_subparts_cpumask() (Multiple Advisories)

Severity
4
CVSS
(AV:L/AC:M/Au:M/C:N/I:N/A:C)
Published
Mar 27, 2025
Added
Jul 9, 2025
Modified
Nov 14, 2025

Description

In the Linux kernel, the following vulnerability has been resolved:

cgroup/cpuset: Fix wrong check in update_parent_subparts_cpumask()

It was found that the check to see if a partition could use up all
the cpus from the parent cpuset in update_parent_subparts_cpumask()
was incorrect. As a result, it is possible to leave parent with no
effective cpu left even if there are tasks in the parent cpuset. This
can lead to system panic as reported in [1].

Fix this probem by updating the check to fail the enabling the partition
if parent's effective_cpus is a subset of the child's cpus_allowed.

Also record the error code when an error happens in update_prstate()
and add a test case where parent partition and child have the same cpu
list and parent has task. Enabling partition in the child will fail in
this case.

[1] https://www.spinics.net/lists/cgroups/msg36254.html

Solutions

no-fix-redhat-rpm-packageredhat-upgrade-kernel
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.