Impact
The cpumask_of_node() routine in the LoongArch architecture of the Linux kernel fails to validate the NUMA_NO_NODE index, a legitimate value used by the kernel to denote an uninitialized NUMA node. When this unchecked value is passed, the function can access memory outside the intended range, potentially leading to kernel corruption or a panic that results in a system-wide crash. The weakness is rooted in an improper bounds check on a memory buffer, which can directly affect system availability and stability.
Affected Systems
All Linux kernel installations that run on LoongArch processors and were built with a kernel version prior to the application of the fix. The bug applies to both kernel source tree variants listed under Linux:Linux, but no specific sub‑version information is available in the data set.
Risk and Exploitability
No CVSS or EPSS score is published for this entry, and the vulnerability is not included in the CISA KEV catalog. Because the flaw requires manipulation of internal kernel data structures rather than a network accessible input, the practical likelihood of exploitation is low; however, if reached, the impact is a full system crash. The most efficient attack represents an active local privileged exploitation scenario with direct manipulation of kernel memory or the CPU mask functions.
OpenCVE Enrichment