CVE-2024-57951
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2024-57951 is a vulnerability in the Linux kernel's hrtimers subsystem, discovered and disclosed in February 2025. The issue affects multiple versions of the Linux kernel, including versions from 4.19.302 up to 4.20, 5.4.264 up to 5.4.290, 5.10.204 up to 5.10.234, and 5.15.143 up to 5.15.177 (NVD).

Technical details

The vulnerability occurs during CPU hotplug operations when a CPU transitions from CPUHPONLINE to CPUHPHRTIMERSPREPARE and back to CPUHPONLINE. During this transition, cpubase.hresactive remains incorrectly set to 1, while the tick and clockevents are shut down at CPUHPAPTICKDYING. This leads to incorrect assumptions about the hrtick's active state and prevents the clockevent device from transitioning to oneshot mode. Additionally, cpubase.online is not properly set after the transition, causing WARNONONCE in enqueue_hrtimer() and potentially leaving dangling pointers (Kernel Patch). The vulnerability has been assigned a CVSS v3.1 base score of 7.8 (High) with vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (NVD).

Impact

The vulnerability can lead to system instability and potential security risks due to incorrect CPU state handling during hotplug operations. The issue can result in dangling pointers in the worst case, which could lead to memory corruption or system crashes (Kernel Patch).

Mitigation and workarounds

The issue has been fixed by adding a corresponding startup() callback that resets the stale per CPU state and sets the online flag correctly. The fix includes making the new callback unconditionally available and modifying the state clearing process in the starting callback (Kernel Patch). Ubuntu and other distributions have begun releasing patches for affected versions (Ubuntu Security).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management