We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-56739

rtc: check if __rtc_read_time was successful in rtc_timer_do_work()



Description

In the Linux kernel, the following vulnerability has been resolved: rtc: check if __rtc_read_time was successful in rtc_timer_do_work() If the __rtc_read_time call fails,, the struct rtc_time tm; may contain uninitialized data, or an illegal date/time read from the RTC hardware. When calling rtc_tm_to_ktime later, the result may be a very large value (possibly KTIME_MAX). If there are periodic timers in rtc->timerqueue, they will continually expire, may causing kernel softlockup.

Reserved 2024-12-29 | Published 2024-12-29 | Updated 2025-01-20 | Assigner Linux

Product status

Default status
unaffected

6610e0893b8bc6f59b14fed7f089c5997f035f88 before 39ad0a1ae17b54509cd9e93dcd8cec16e7c12d3f
affected

6610e0893b8bc6f59b14fed7f089c5997f035f88 before 44b3257ff705d63d5f00ef8ed314a0eeb7ec37f2
affected

6610e0893b8bc6f59b14fed7f089c5997f035f88 before 0d68e8514d9040108ff7d1b37ca71096674b6efe
affected

6610e0893b8bc6f59b14fed7f089c5997f035f88 before 246f621d363988e7040f4546d20203dc713fa3e1
affected

6610e0893b8bc6f59b14fed7f089c5997f035f88 before fde56535505dde3336df438e949ef4742b6d6d6e
affected

6610e0893b8bc6f59b14fed7f089c5997f035f88 before dd4b1cbcc916fad5d10c2662b62def9f05e453d4
affected

6610e0893b8bc6f59b14fed7f089c5997f035f88 before a1f0b4af90cc18b10261ecde56c6a56b22c75bd1
affected

6610e0893b8bc6f59b14fed7f089c5997f035f88 before e77bce0a8c3989b4173c36f4195122bca8f4a3e1
affected

6610e0893b8bc6f59b14fed7f089c5997f035f88 before e8ba8a2bc4f60a1065f23d6a0e7cbea945a0f40d
affected

Default status
affected

2.6.38
affected

Any version before 2.6.38
unaffected

4.19.325
unaffected

5.4.287
unaffected

5.10.231
unaffected

5.15.174
unaffected

6.1.120
unaffected

6.6.64
unaffected

6.11.11
unaffected

6.12.2
unaffected

6.13
unaffected

References

git.kernel.org/...c/39ad0a1ae17b54509cd9e93dcd8cec16e7c12d3f

git.kernel.org/...c/44b3257ff705d63d5f00ef8ed314a0eeb7ec37f2

git.kernel.org/...c/0d68e8514d9040108ff7d1b37ca71096674b6efe

git.kernel.org/...c/246f621d363988e7040f4546d20203dc713fa3e1

git.kernel.org/...c/fde56535505dde3336df438e949ef4742b6d6d6e

git.kernel.org/...c/dd4b1cbcc916fad5d10c2662b62def9f05e453d4

git.kernel.org/...c/a1f0b4af90cc18b10261ecde56c6a56b22c75bd1

git.kernel.org/...c/e77bce0a8c3989b4173c36f4195122bca8f4a3e1

git.kernel.org/...c/e8ba8a2bc4f60a1065f23d6a0e7cbea945a0f40d

cve.org (CVE-2024-56739)

nvd.nist.gov (CVE-2024-56739)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-56739

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.