Количество 4
Количество 4
CVE-2021-47377
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
CVE-2021-47377
[REJECTED CVE] In the Linux kernel, the following vulnerability has been resolved: xen/balloon: use a kernel thread instead a workqueue The Linux kernel CVE team has assigned CVE-2021-47377 to this issue.
CVE-2021-47377
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
GHSA-7rxq-5vw3-rhvg
In the Linux kernel, the following vulnerability has been resolved: xen/balloon: use a kernel thread instead a workqueue Today the Xen ballooning is done via delayed work in a workqueue. This might result in workqueue hangups being reported in case of large amounts of memory are being ballooned in one go (here 16GB): BUG: workqueue lockup - pool cpus=6 node=0 flags=0x0 nice=0 stuck for 64s! Showing busy workqueues and worker pools: workqueue events: flags=0x0 pwq 12: cpus=6 node=0 flags=0x0 nice=0 active=2/256 refcnt=3 in-flight: 229:balloon_process pending: cache_reap workqueue events_freezable_power_: flags=0x84 pwq 12: cpus=6 node=0 flags=0x0 nice=0 active=1/256 refcnt=2 pending: disk_events_workfn workqueue mm_percpu_wq: flags=0x8 pwq 12: cpus=6 node=0 flags=0x0 nice=0 active=1/256 refcnt=2 pending: vmstat_update pool 12: cpus=6 node=0 flags=0x0 nice=0 hung=64s workers=3 idle: 2222 43 This can easily be avoided by using a dedicated kernel thread for doi...
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2021-47377 Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | больше 1 года назад | |||
CVE-2021-47377 [REJECTED CVE] In the Linux kernel, the following vulnerability has been resolved: xen/balloon: use a kernel thread instead a workqueue The Linux kernel CVE team has assigned CVE-2021-47377 to this issue. | больше 1 года назад | |||
CVE-2021-47377 Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | больше 1 года назад | |||
GHSA-7rxq-5vw3-rhvg In the Linux kernel, the following vulnerability has been resolved: xen/balloon: use a kernel thread instead a workqueue Today the Xen ballooning is done via delayed work in a workqueue. This might result in workqueue hangups being reported in case of large amounts of memory are being ballooned in one go (here 16GB): BUG: workqueue lockup - pool cpus=6 node=0 flags=0x0 nice=0 stuck for 64s! Showing busy workqueues and worker pools: workqueue events: flags=0x0 pwq 12: cpus=6 node=0 flags=0x0 nice=0 active=2/256 refcnt=3 in-flight: 229:balloon_process pending: cache_reap workqueue events_freezable_power_: flags=0x84 pwq 12: cpus=6 node=0 flags=0x0 nice=0 active=1/256 refcnt=2 pending: disk_events_workfn workqueue mm_percpu_wq: flags=0x8 pwq 12: cpus=6 node=0 flags=0x0 nice=0 active=1/256 refcnt=2 pending: vmstat_update pool 12: cpus=6 node=0 flags=0x0 nice=0 hung=64s workers=3 idle: 2222 43 This can easily be avoided by using a dedicated kernel thread for doi... | больше 1 года назад |
Уязвимостей на страницу