{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2024-44968","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-08-21T05:34:56.667Z","datePublished":"2024-09-04T18:56:45.456Z","dateUpdated":"2025-11-03T22:14:18.137Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2025-05-04T09:29:59.239Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\ntick/broadcast: Move per CPU pointer access into the atomic section\n\nThe recent fix for making the take over of the broadcast timer more\nreliable retrieves a per CPU pointer in preemptible context.\n\nThis went unnoticed as compilers hoist the access into the non-preemptible\nregion where the pointer is actually used. But of course it's valid that\nthe compiler keeps it at the place where the code puts it which rightfully\ntriggers:\n\n  BUG: using smp_processor_id() in preemptible [00000000] code:\n       caller is hotplug_cpu__broadcast_tick_pull+0x1c/0xc0\n\nMove it to the actual usage site which is in a non-preemptible region."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["kernel/time/tick-broadcast.c"],"versions":[{"version":"dfe19aa91378972f10530635ad83b2d77f481044","lessThan":"f54abf332a2bc0413cfa8bd6a8511f7aa99faea0","status":"affected","versionType":"git"},{"version":"457a1c87d454455d671a3045cf0b56157be110a1","lessThan":"f91fb47ecacc178a83a77eeebd25cbaec18c01d6","status":"affected","versionType":"git"},{"version":"9ef7190228145f959d9bc0ddca40ecf76bb413b0","lessThan":"668c6c4a7e9e9f081c06b70f30104fb7013437ed","status":"affected","versionType":"git"},{"version":"d3b165c10473aa6fc6141bb5b1f6e5b50c1fb774","lessThan":"541a900d245536d4809cb1aa322c3fcc2cdb58a6","status":"affected","versionType":"git"},{"version":"408bfb6b0a7f22e971ce6b600aec448769e580a8","lessThan":"7b3ec186ba93e333e9efe7254e7e31c1828e5d2d","status":"affected","versionType":"git"},{"version":"3a58c590f6bd1d20eb1e76c5cea31c36cc032339","lessThan":"b9d604933d5fd72dd37f24e1dc35f778297d745a","status":"affected","versionType":"git"},{"version":"2cdab4b4bf77369961f706cdeb7d040db10c5217","lessThan":"7dd12f85f150010ef7518201c63fa7e395f5c3e9","status":"affected","versionType":"git"},{"version":"f7d43dd206e7e18c182f200e67a8db8c209907fa","lessThan":"6881e75237a84093d0986f56223db3724619f26e","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["kernel/time/tick-broadcast.c"],"versions":[{"version":"6.1.103","lessThan":"6.1.105","status":"affected","versionType":"semver"},{"version":"6.6.44","lessThan":"6.6.46","status":"affected","versionType":"semver"},{"version":"6.10.3","lessThan":"6.10.5","status":"affected","versionType":"semver"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.1.103","versionEndExcluding":"6.1.105"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.6.44","versionEndExcluding":"6.6.46"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.10.3","versionEndExcluding":"6.10.5"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/f54abf332a2bc0413cfa8bd6a8511f7aa99faea0"},{"url":"https://git.kernel.org/stable/c/f91fb47ecacc178a83a77eeebd25cbaec18c01d6"},{"url":"https://git.kernel.org/stable/c/668c6c4a7e9e9f081c06b70f30104fb7013437ed"},{"url":"https://git.kernel.org/stable/c/541a900d245536d4809cb1aa322c3fcc2cdb58a6"},{"url":"https://git.kernel.org/stable/c/7b3ec186ba93e333e9efe7254e7e31c1828e5d2d"},{"url":"https://git.kernel.org/stable/c/b9d604933d5fd72dd37f24e1dc35f778297d745a"},{"url":"https://git.kernel.org/stable/c/7dd12f85f150010ef7518201c63fa7e395f5c3e9"},{"url":"https://git.kernel.org/stable/c/6881e75237a84093d0986f56223db3724619f26e"}],"title":"tick/broadcast: Move per CPU pointer access into the atomic section","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2024-44968","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2024-09-10T17:39:24.484235Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-12T17:33:33.994Z"}},{"title":"CVE Program Container","references":[{"url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"},{"url":"https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T22:14:18.137Z"}}]}}