CVE-2024-44968

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-44968
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-44968.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-44968
Downstream
Related
Published
2024-09-04T18:56:45.456Z
Modified
2025-12-01T12:15:40.795496Z
Summary
tick/broadcast: Move per CPU pointer access into the atomic section
Details

In the Linux kernel, the following vulnerability has been resolved:

tick/broadcast: Move per CPU pointer access into the atomic section

The recent fix for making the take over of the broadcast timer more reliable retrieves a per CPU pointer in preemptible context.

This went unnoticed as compilers hoist the access into the non-preemptible region where the pointer is actually used. But of course it's valid that the compiler keeps it at the place where the code puts it which rightfully triggers:

BUG: using smpprocessorid() in preemptible [00000000] code: caller is hotplugcpubroadcasttick_pull+0x1c/0xc0

Move it to the actual usage site which is in a non-preemptible region.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/44xxx/CVE-2024-44968.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
dfe19aa91378972f10530635ad83b2d77f481044
Fixed
f54abf332a2bc0413cfa8bd6a8511f7aa99faea0
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
457a1c87d454455d671a3045cf0b56157be110a1
Fixed
f91fb47ecacc178a83a77eeebd25cbaec18c01d6
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
9ef7190228145f959d9bc0ddca40ecf76bb413b0
Fixed
668c6c4a7e9e9f081c06b70f30104fb7013437ed
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
d3b165c10473aa6fc6141bb5b1f6e5b50c1fb774
Fixed
541a900d245536d4809cb1aa322c3fcc2cdb58a6
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
408bfb6b0a7f22e971ce6b600aec448769e580a8
Fixed
7b3ec186ba93e333e9efe7254e7e31c1828e5d2d
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
3a58c590f6bd1d20eb1e76c5cea31c36cc032339
Fixed
b9d604933d5fd72dd37f24e1dc35f778297d745a
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
2cdab4b4bf77369961f706cdeb7d040db10c5217
Fixed
7dd12f85f150010ef7518201c63fa7e395f5c3e9
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
f7d43dd206e7e18c182f200e67a8db8c209907fa
Fixed
6881e75237a84093d0986f56223db3724619f26e

Affected versions

v6.*

v6.1.103
v6.1.104
v6.10
v6.10-rc3
v6.10-rc4
v6.10-rc5
v6.10-rc6
v6.10-rc7
v6.10.3
v6.10.4
v6.11-rc1
v6.6.44
v6.6.45

Database specific

source

"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-44968.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.1.103
Fixed
6.1.105
Type
ECOSYSTEM
Events
Introduced
6.6.44
Fixed
6.6.46
Type
ECOSYSTEM
Events
Introduced
6.10.3
Fixed
6.10.5

Database specific

source

"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-44968.json"