{"id":"CVE-2024-46832","summary":"MIPS: cevt-r4k: Don't call get_c0_compare_int if timer irq is installed","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nMIPS: cevt-r4k: Don't call get_c0_compare_int if timer irq is installed\n\nThis avoids warning:\n\n[    0.118053] BUG: sleeping function called from invalid context at kernel/locking/mutex.c:283\n\nCaused by get_c0_compare_int on secondary CPU.\n\nWe also skipped saving IRQ number to struct clock_event_device *cd as\nit's never used by clockevent core, as per comments it's only meant\nfor \"non CPU local devices\".","modified":"2026-05-18T05:56:09.038595183Z","published":"2024-09-27T12:39:29.734Z","database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/46xxx/CVE-2024-46832.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/189d3ed3b25beee26ffe2abed278208bece13f52"},{"type":"WEB","url":"https://git.kernel.org/stable/c/32ee0520159f1e8c2d6597c19690df452c528f30"},{"type":"WEB","url":"https://git.kernel.org/stable/c/50f2b98dc83de7809a5c5bf0ccf9af2e75c37c13"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b1d2051373bfc65371ce4ac8911ed984d0178c98"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d3ff0f98a52f0aafe35aa314d1c442f4318be3db"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e6cd871627abbb459d0ff6521d6bb9cf9d9f7522"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/46xxx/CVE-2024-46832.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46832"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"38760d40ca61b18b2809e9c28df8b3ff9af8a02b"},{"fixed":"d3ff0f98a52f0aafe35aa314d1c442f4318be3db"},{"fixed":"e6cd871627abbb459d0ff6521d6bb9cf9d9f7522"},{"fixed":"b1d2051373bfc65371ce4ac8911ed984d0178c98"},{"fixed":"32ee0520159f1e8c2d6597c19690df452c528f30"},{"fixed":"189d3ed3b25beee26ffe2abed278208bece13f52"},{"fixed":"50f2b98dc83de7809a5c5bf0ccf9af2e75c37c13"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-46832.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"2.6.24"},{"fixed":"5.10.226"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.167"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.110"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.51"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.10.10"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-46832.json"}}],"schema_version":"1.7.5"}