
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
CVE-2024-57951 is a vulnerability in the Linux kernel's hrtimers subsystem, discovered and disclosed in February 2025. The issue affects multiple versions of the Linux kernel, including versions from 4.19.302 up to 4.20, 5.4.264 up to 5.4.290, 5.10.204 up to 5.10.234, and 5.15.143 up to 5.15.177 (NVD).
The vulnerability occurs during CPU hotplug operations when a CPU transitions from CPUHPONLINE to CPUHPHRTIMERSPREPARE and back to CPUHPONLINE. During this transition, cpubase.hresactive remains incorrectly set to 1, while the tick and clockevents are shut down at CPUHPAPTICKDYING. This leads to incorrect assumptions about the hrtick's active state and prevents the clockevent device from transitioning to oneshot mode. Additionally, cpubase.online is not properly set after the transition, causing WARNONONCE in enqueue_hrtimer() and potentially leaving dangling pointers (Kernel Patch). The vulnerability has been assigned a CVSS v3.1 base score of 7.8 (High) with vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (NVD).
The vulnerability can lead to system instability and potential security risks due to incorrect CPU state handling during hotplug operations. The issue can result in dangling pointers in the worst case, which could lead to memory corruption or system crashes (Kernel Patch).
The issue has been fixed by adding a corresponding startup() callback that resets the stale per CPU state and sets the online flag correctly. The fix includes making the new callback unconditionally available and modifying the state clearing process in the starting callback (Kernel Patch). Ubuntu and other distributions have begun releasing patches for affected versions (Ubuntu Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”