๐Ÿ” CVE Alert

CVE-2024-46829

UNKNOWN 0.0

rtmutex: Drop rt_mutex::wait_lock before scheduling

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: rtmutex: Drop rt_mutex::wait_lock before scheduling rt_mutex_handle_deadlock() is called with rt_mutex::wait_lock held. In the good case it returns with the lock held and in the deadlock case it emits a warning and goes into an endless scheduling loop with the lock held, which triggers the 'scheduling in atomic' warning. Unlock rt_mutex::wait_lock in the dead lock case before issuing the warning and dropping into the schedule for ever loop. [ tglx: Moved unlock before the WARN(), removed the pointless comment, massaged changelog, added Fixes tag ]

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Sep 27, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
3d5c9340d1949733eb37616abd15db36aef9a57c < 432efdbe7da5ecfcbc0c2180cfdbab1441752a38 3d5c9340d1949733eb37616abd15db36aef9a57c < 6a976e9a47e8e5b326de671811561cab12e6fb1f 3d5c9340d1949733eb37616abd15db36aef9a57c < 1401da1486dc1cdbef6025fd74a3977df3a3e5d0 3d5c9340d1949733eb37616abd15db36aef9a57c < 93f44655472d9cd418293d328f9d141ca234ad83 3d5c9340d1949733eb37616abd15db36aef9a57c < a92d81c9efec9280681c27a2c0a963fd0f1338e0 3d5c9340d1949733eb37616abd15db36aef9a57c < 85f03ca98e07cd0786738b56ae73740bce0ac27f 3d5c9340d1949733eb37616abd15db36aef9a57c < f13b5afc5c4889569d84c3011ce449f61fccfb28 3d5c9340d1949733eb37616abd15db36aef9a57c < d33d26036a0274b472299d7dcdaa5fb34329f91b 95f9aded9436aa3ce714aeff3f45fcc1431df7d2 ea018da95368adfb700689bd9842714f7c3db665 1201613a70dd34bd347ba2970919b3f1d5fbfb4a a2e64fcdc83c645813f7b93e4df291841ba7c625 fb52f40e085ef4074f1335672cd62c1f832af13b 2b1f3807ed9cafb59c956ce76a05d25e67103f2e
Linux / Linux
3.16

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/432efdbe7da5ecfcbc0c2180cfdbab1441752a38 git.kernel.org: https://git.kernel.org/stable/c/6a976e9a47e8e5b326de671811561cab12e6fb1f git.kernel.org: https://git.kernel.org/stable/c/1401da1486dc1cdbef6025fd74a3977df3a3e5d0 git.kernel.org: https://git.kernel.org/stable/c/93f44655472d9cd418293d328f9d141ca234ad83 git.kernel.org: https://git.kernel.org/stable/c/a92d81c9efec9280681c27a2c0a963fd0f1338e0 git.kernel.org: https://git.kernel.org/stable/c/85f03ca98e07cd0786738b56ae73740bce0ac27f git.kernel.org: https://git.kernel.org/stable/c/f13b5afc5c4889569d84c3011ce449f61fccfb28 git.kernel.org: https://git.kernel.org/stable/c/d33d26036a0274b472299d7dcdaa5fb34329f91b lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html