Executive Summary

Informations
Name CVE-2024-57951 First vendor Publication 2025-02-12
Vendor Cve Last vendor Modification 2025-02-14

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Overall CVSS Score 7.8
Base Score 7.8 Environmental Score 7.8
impact SubScore 5.9 Temporal Score 7.8
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact High
Integrity Impact High Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

hrtimers: Handle CPU state correctly on hotplug

Consider a scenario where a CPU transitions from CPUHP_ONLINE to halfway through a CPU hotunplug down to CPUHP_HRTIMERS_PREPARE, and then back to CPUHP_ONLINE:

Since hrtimers_prepare_cpu() does not run, cpu_base.hres_active remains set to 1 throughout. However, during a CPU unplug operation, the tick and the clockevents are shut down at CPUHP_AP_TICK_DYING. On return to the online state, for instance CFS incorrectly assumes that the hrtick is already active, and the chance of the clockevent device to transition to oneshot mode is also lost forever for the CPU, unless it goes back to a lower state than CPUHP_HRTIMERS_PREPARE once.

This round-trip reveals another issue; cpu_base.online is not set to 1 after the transition, which appears as a WARN_ON_ONCE in enqueue_hrtimer().

Aside of that, the bulk of the per CPU state is not reset either, which means there are dangling pointers in the worst case.

Address this by adding a corresponding startup() callback, which resets the stale per CPU state and sets the online flag.

[ tglx: Make the new callback unconditionally available, remove the online
modification in the prepare() callback and clear the remaining
state in the starting callback instead of the prepare callback ]

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57951

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-416 Use After Free

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 3699

Sources (Detail)

https://git.kernel.org/stable/c/14984139f1f2768883332965db566ef26db609e7
https://git.kernel.org/stable/c/15b453db41d36184cf0ccc21e7df624014ab6a1a
https://git.kernel.org/stable/c/2f8dea1692eef2b7ba6a256246ed82c365fdc686
https://git.kernel.org/stable/c/38492f6ee883c7b1d33338bf531a62cff69b4b28
https://git.kernel.org/stable/c/3d41dbf82e10c44e53ea602398ab002baec27e75
https://git.kernel.org/stable/c/95e4f62df23f4df1ce6ef897d44b8e23c260921a
https://git.kernel.org/stable/c/a5cbbea145b400e40540c34816d16d36e0374fbc
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
Date Informations
2025-03-28 03:22:42
  • Multiple Updates
2025-03-25 03:28:38
  • Multiple Updates
2025-03-19 03:17:28
  • Multiple Updates
2025-03-18 03:30:27
  • Multiple Updates
2025-03-14 03:17:33
  • Multiple Updates
2025-03-06 14:14:07
  • Multiple Updates
2025-02-22 00:20:38
  • Multiple Updates
2025-02-14 21:20:35
  • Multiple Updates
2025-02-12 17:20:29
  • First insertion