We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: rtc: check if __rtc_read_time was successful in rtc_timer_do_work() If the __rtc_read_time call fails,, the struct rtc_time tm; may contain uninitialized data, or an illegal date/time read from the RTC hardware. When calling rtc_tm_to_ktime later, the result may be a very large value (possibly KTIME_MAX). If there are periodic timers in rtc->timerqueue, they will continually expire, may causing kernel softlockup.
Reserved 2024-12-29 | Published 2024-12-29 | Updated 2025-01-20 | Assigner Linuxgit.kernel.org/...c/39ad0a1ae17b54509cd9e93dcd8cec16e7c12d3f
git.kernel.org/...c/44b3257ff705d63d5f00ef8ed314a0eeb7ec37f2
git.kernel.org/...c/0d68e8514d9040108ff7d1b37ca71096674b6efe
git.kernel.org/...c/246f621d363988e7040f4546d20203dc713fa3e1
git.kernel.org/...c/fde56535505dde3336df438e949ef4742b6d6d6e
git.kernel.org/...c/dd4b1cbcc916fad5d10c2662b62def9f05e453d4
git.kernel.org/...c/a1f0b4af90cc18b10261ecde56c6a56b22c75bd1
git.kernel.org/...c/e77bce0a8c3989b4173c36f4195122bca8f4a3e1
git.kernel.org/...c/e8ba8a2bc4f60a1065f23d6a0e7cbea945a0f40d
Support options