PT-2024-21590 · Linux +3 · Linux Kernel +3
Jerry Snitselaar
·
Published
2024-03-22
·
Updated
2024-08-20
·
CVE-2024-26945
CVSS v3.1
8.4
8.4
High
Base vector | Vector | AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions:
Linux kernel (affected versions not specified)
Description:
A vulnerability has been resolved in the Linux kernel, specifically in the crypto: iaa component. The issue occurs when `nr cpus` is less than `nr iaa`, causing the calculated `cpus per iaa` to be 0, which leads to a divide-by-0 error in the `rebalance wq table()` function. To fix this, `cpus per iaa` is set to 1 in such cases, as well as when `nr iaa` equals 0, for added security.
Recommendations:
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Divide By Zero
Weakness Enumeration
Related Identifiers
BDU:2025-07412
CVE-2024-26945
SUSE-SU-2024:2135-1
SUSE-SU-2024:2203-1
SUSE-SU-2024:2973-1
USN-6816-1
USN-6817-1
USN-6817-2
USN-6817-3
USN-6878-1
Affected Products
Linuxmint
Linux Kernel
Suse
Ubuntu
References · 2439
- https://ubuntu.com/security/CVE-2024-26866 · Vendor Advisory
- https://ubuntu.com/security/CVE-2024-35831 · Vendor Advisory
- https://osv.dev/vulnerability/USN-6817-3 · Vendor Advisory
- https://ubuntu.com/security/CVE-2024-27392 · Vendor Advisory
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27078 · Security Note
- https://bdu.fstec.ru/vul/2024-03754 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26655 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26863 · Security Note
- https://bdu.fstec.ru/vul/2025-03930 · Security Note
- https://bdu.fstec.ru/vul/2025-04402 · Security Note
- https://ubuntu.com/security/CVE-2023-7042 · Vendor Advisory
- https://ubuntu.com/security/CVE-2024-27042 · Vendor Advisory
- https://ubuntu.com/security/CVE-2024-27066 · Vendor Advisory
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27072 · Security Note
- https://ubuntu.com/security/CVE-2023-47233 · Vendor Advisory