CVE-2024-57951
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2024-57951 is a vulnerability in the Linux kernel's hrtimers subsystem, discovered and disclosed in February 2025. The issue affects multiple versions of the Linux kernel, including versions from 4.19.302 up to 4.20, 5.4.264 up to 5.4.290, 5.10.204 up to 5.10.234, and 5.15.143 up to 5.15.177 (NVD).

Technical details

The vulnerability occurs during CPU hotplug operations when a CPU transitions from CPUHP_ONLINE to CPUHP_HRTIMERS_PREPARE and back to CPUHP_ONLINE. During this transition, cpu_base.hres_active remains incorrectly set to 1, while the tick and clockevents are shut down at CPUHP_AP_TICK_DYING. This leads to incorrect assumptions about the hrtick's active state and prevents the clockevent device from transitioning to oneshot mode. Additionally, cpu_base.online is not properly set after the transition, causing WARN_ON_ONCE in enqueue_hrtimer() and potentially leaving dangling pointers (Kernel Patch). The vulnerability has been assigned a CVSS v3.1 base score of 7.8 (High) with vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (NVD).

Impact

The vulnerability can lead to system instability and potential security risks due to incorrect CPU state handling during hotplug operations. The issue can result in dangling pointers in the worst case, which could lead to memory corruption or system crashes (Kernel Patch).

Mitigation and workarounds

The issue has been fixed by adding a corresponding startup() callback that resets the stale per CPU state and sets the online flag correctly. The fix includes making the new callback unconditionally available and modifying the state clearing process in the starting callback (Kernel Patch). Ubuntu and other distributions have begun releasing patches for affected versions (Ubuntu Security).

Additional resources


SourceThis report was generated using AI

Related Linux Kernel vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-68753HIGH7.8
  • Linux KernelLinux Kernel
  • linux-oem-6.14
NoYesJan 05, 2026
CVE-2025-68756HIGH7.1
  • Linux KernelLinux Kernel
  • kernel-rt-64k-debug
NoYesJan 05, 2026
CVE-2025-68764MEDIUM5.5
  • Linux KernelLinux Kernel
  • kernel-rt-64k-core
NoYesJan 05, 2026
CVE-2025-68758MEDIUM5.5
  • Linux KernelLinux Kernel
  • linux-nvidia-tegra-5.15
NoYesJan 05, 2026
CVE-2025-68762N/AN/A
  • Linux KernelLinux Kernel
  • linux-aws-fips
NoYesJan 05, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management