CVE-2024-57977
Linux Kernel vulnerability analysis and mitigation

Overview

A soft lockup vulnerability (CVE-2024-57977) was discovered in the Linux kernel's memory control group (memcg) functionality. The issue was found when approximately 56,000 tasks were in the OOM (Out Of Memory) cgroup, causing the system to get stuck while traversing them. This vulnerability was discovered in February 2025 and affects Linux kernel versions from 3.6 through 6.12.13 and 6.13 through 6.13.2 (NVD).

Technical details

The vulnerability occurs in the memory control group (memcg) subsystem when traversing tasks during an OOM condition. When a large number of processes (around 56,000) are in the OOM cgroup, the system experiences a soft lockup while traversing them, with the CPU getting stuck for 23 seconds. The issue manifests as a watchdog BUG report with CPU#2 becoming unresponsive during the VM Thread execution. The vulnerability has been assigned a CVSS v3.1 score of 5.5 (Medium) with vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H (NVD).

Impact

The vulnerability can lead to system performance degradation and potential denial of service conditions when the OOM killer process becomes stuck in a soft lockup state. This affects system stability and resource management capabilities, particularly in environments with a large number of processes under memory pressure (NVD).

Mitigation and workarounds

The issue has been fixed by implementing two key changes in the kernel code: 1) Adding a call to 'condresched' in the 'memcgroupscantasks' function per 1000 iterations, and 2) Calling 'touchsoftlockupwatchdog' per 1000 iterations for global OOM situations. These changes have been implemented in the kernel patches (Kernel Patch).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management