CVE-2024-56739
Vulnerability from cvelistv5
Published
2024-12-29 11:30
Modified
2024-12-29 11:30
Severity ?
EPSS score ?
Summary
In the Linux kernel, the following vulnerability has been resolved:
rtc: check if __rtc_read_time was successful in rtc_timer_do_work()
If the __rtc_read_time call fails,, the struct rtc_time tm; may contain
uninitialized data, or an illegal date/time read from the RTC hardware.
When calling rtc_tm_to_ktime later, the result may be a very large value
(possibly KTIME_MAX). If there are periodic timers in rtc->timerqueue,
they will continually expire, may causing kernel softlockup.
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | Linux | Linux |
Version: 6610e0893b8bc6f59b14fed7f089c5997f035f88 Version: 6610e0893b8bc6f59b14fed7f089c5997f035f88 Version: 6610e0893b8bc6f59b14fed7f089c5997f035f88 Version: 6610e0893b8bc6f59b14fed7f089c5997f035f88 Version: 6610e0893b8bc6f59b14fed7f089c5997f035f88 Version: 6610e0893b8bc6f59b14fed7f089c5997f035f88 Version: 6610e0893b8bc6f59b14fed7f089c5997f035f88 Version: 6610e0893b8bc6f59b14fed7f089c5997f035f88 Version: 6610e0893b8bc6f59b14fed7f089c5997f035f88 |
||||
|
{ "containers": { "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/rtc/interface.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "39ad0a1ae17b54509cd9e93dcd8cec16e7c12d3f", "status": "affected", "version": "6610e0893b8bc6f59b14fed7f089c5997f035f88", "versionType": "git" }, { "lessThan": "44b3257ff705d63d5f00ef8ed314a0eeb7ec37f2", "status": "affected", "version": "6610e0893b8bc6f59b14fed7f089c5997f035f88", "versionType": "git" }, { "lessThan": "0d68e8514d9040108ff7d1b37ca71096674b6efe", "status": "affected", "version": "6610e0893b8bc6f59b14fed7f089c5997f035f88", "versionType": "git" }, { "lessThan": "246f621d363988e7040f4546d20203dc713fa3e1", "status": "affected", "version": "6610e0893b8bc6f59b14fed7f089c5997f035f88", "versionType": "git" }, { "lessThan": "fde56535505dde3336df438e949ef4742b6d6d6e", "status": "affected", "version": "6610e0893b8bc6f59b14fed7f089c5997f035f88", "versionType": "git" }, { "lessThan": "dd4b1cbcc916fad5d10c2662b62def9f05e453d4", "status": "affected", "version": "6610e0893b8bc6f59b14fed7f089c5997f035f88", "versionType": "git" }, { "lessThan": "a1f0b4af90cc18b10261ecde56c6a56b22c75bd1", "status": "affected", "version": "6610e0893b8bc6f59b14fed7f089c5997f035f88", "versionType": "git" }, { "lessThan": "e77bce0a8c3989b4173c36f4195122bca8f4a3e1", "status": "affected", "version": "6610e0893b8bc6f59b14fed7f089c5997f035f88", "versionType": "git" }, { "lessThan": "e8ba8a2bc4f60a1065f23d6a0e7cbea945a0f40d", "status": "affected", "version": "6610e0893b8bc6f59b14fed7f089c5997f035f88", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/rtc/interface.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "2.6.38" }, { "lessThan": "2.6.38", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "4.19.*", "status": "unaffected", "version": "4.19.325", "versionType": "semver" }, { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.287", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.231", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.174", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.120", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.64", "versionType": "semver" }, { "lessThanOrEqual": "6.11.*", "status": "unaffected", "version": "6.11.11", "versionType": "semver" }, { "lessThanOrEqual": "6.12.*", "status": "unaffected", "version": "6.12.2", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.13-rc1", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nrtc: check if __rtc_read_time was successful in rtc_timer_do_work()\n\nIf the __rtc_read_time call fails,, the struct rtc_time tm; may contain\nuninitialized data, or an illegal date/time read from the RTC hardware.\n\nWhen calling rtc_tm_to_ktime later, the result may be a very large value\n(possibly KTIME_MAX). If there are periodic timers in rtc-\u003etimerqueue,\nthey will continually expire, may causing kernel softlockup." } ], "providerMetadata": { "dateUpdated": "2024-12-29T11:30:08.512Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/39ad0a1ae17b54509cd9e93dcd8cec16e7c12d3f" }, { "url": "https://git.kernel.org/stable/c/44b3257ff705d63d5f00ef8ed314a0eeb7ec37f2" }, { "url": "https://git.kernel.org/stable/c/0d68e8514d9040108ff7d1b37ca71096674b6efe" }, { "url": "https://git.kernel.org/stable/c/246f621d363988e7040f4546d20203dc713fa3e1" }, { "url": "https://git.kernel.org/stable/c/fde56535505dde3336df438e949ef4742b6d6d6e" }, { "url": "https://git.kernel.org/stable/c/dd4b1cbcc916fad5d10c2662b62def9f05e453d4" }, { "url": "https://git.kernel.org/stable/c/a1f0b4af90cc18b10261ecde56c6a56b22c75bd1" }, { "url": "https://git.kernel.org/stable/c/e77bce0a8c3989b4173c36f4195122bca8f4a3e1" }, { "url": "https://git.kernel.org/stable/c/e8ba8a2bc4f60a1065f23d6a0e7cbea945a0f40d" } ], "title": "rtc: check if __rtc_read_time was successful in rtc_timer_do_work()", "x_generator": { "engine": "bippy-5f407fcff5a0" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-56739", "datePublished": "2024-12-29T11:30:08.512Z", "dateReserved": "2024-12-29T11:26:39.757Z", "dateUpdated": "2024-12-29T11:30:08.512Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-56739\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-12-29T12:15:07.240\",\"lastModified\":\"2024-12-29T12:15:07.240\",\"vulnStatus\":\"Received\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nrtc: check if __rtc_read_time was successful in rtc_timer_do_work()\\n\\nIf the __rtc_read_time call fails,, the struct rtc_time tm; may contain\\nuninitialized data, or an illegal date/time read from the RTC hardware.\\n\\nWhen calling rtc_tm_to_ktime later, the result may be a very large value\\n(possibly KTIME_MAX). If there are periodic timers in rtc-\u003etimerqueue,\\nthey will continually expire, may causing kernel softlockup.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/0d68e8514d9040108ff7d1b37ca71096674b6efe\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/246f621d363988e7040f4546d20203dc713fa3e1\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/39ad0a1ae17b54509cd9e93dcd8cec16e7c12d3f\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/44b3257ff705d63d5f00ef8ed314a0eeb7ec37f2\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/a1f0b4af90cc18b10261ecde56c6a56b22c75bd1\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/dd4b1cbcc916fad5d10c2662b62def9f05e453d4\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/e77bce0a8c3989b4173c36f4195122bca8f4a3e1\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/e8ba8a2bc4f60a1065f23d6a0e7cbea945a0f40d\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/fde56535505dde3336df438e949ef4742b6d6d6e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.