Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: MIPS: cevt-r4k: Don't call get_c0_compare_int if timer irq is installed This avoids warning: [ 0.118053] BUG: sleeping function called from invalid context at kernel/locking/mutex.c:283 Caused by get_c0_compare_int on secondary CPU. We also skipped saving IRQ number to struct clock_event_device *cd as it's never used by clockevent core, as per comments it's only meant for "non CPU local devices".
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | < 5.10.226 |
References
- https://git.kernel.org/stable/c/189d3ed3b25beee26ffe2abed278208bece13f52Patch
- https://git.kernel.org/stable/c/32ee0520159f1e8c2d6597c19690df452c528f30Patch
- https://git.kernel.org/stable/c/50f2b98dc83de7809a5c5bf0ccf9af2e75c37c13Patch
- https://git.kernel.org/stable/c/b1d2051373bfc65371ce4ac8911ed984d0178c98Patch
- https://git.kernel.org/stable/c/d3ff0f98a52f0aafe35aa314d1c442f4318be3dbPatch
- https://git.kernel.org/stable/c/e6cd871627abbb459d0ff6521d6bb9cf9d9f7522Patch
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html
FAQ
What is CVE-2024-46832?
CVE-2024-46832 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: MIPS: cevt-r4k: Don't call get_c0_compare_int if timer irq is installed This avoids warning: [ 0.118053] BUG: sleeping functio...
How severe is CVE-2024-46832?
CVE-2024-46832 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-46832?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.