CVE-2024-46832

Source
https://cve.org/CVERecord?id=CVE-2024-46832
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-46832.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-46832
Downstream
Published
2024-09-27T12:39:29.734Z
Modified
2026-05-18T05:56:09.038595183Z
Summary
MIPS: cevt-r4k: Don't call get_c0_compare_int if timer irq is installed
Details

In the Linux kernel, the following vulnerability has been resolved:

MIPS: cevt-r4k: Don't call getc0compare_int if timer irq is installed

This avoids warning:

[ 0.118053] BUG: sleeping function called from invalid context at kernel/locking/mutex.c:283

Caused by getc0compare_int on secondary CPU.

We also skipped saving IRQ number to struct clockeventdevice *cd as it's never used by clockevent core, as per comments it's only meant for "non CPU local devices".

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/46xxx/CVE-2024-46832.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
38760d40ca61b18b2809e9c28df8b3ff9af8a02b
Fixed
d3ff0f98a52f0aafe35aa314d1c442f4318be3db
Fixed
e6cd871627abbb459d0ff6521d6bb9cf9d9f7522
Fixed
b1d2051373bfc65371ce4ac8911ed984d0178c98
Fixed
32ee0520159f1e8c2d6597c19690df452c528f30
Fixed
189d3ed3b25beee26ffe2abed278208bece13f52
Fixed
50f2b98dc83de7809a5c5bf0ccf9af2e75c37c13

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-46832.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.6.24
Fixed
5.10.226
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.167
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.110
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.51
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.10.10

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-46832.json"