In the Linux kernel, the following vulnerability has been resolved:
rtc: check if __rtc_read_time was successful in rtc_timer_do_work()
If the __rtc_read_time call fails,, the struct rtc_time tm; may contain
uninitialized data, or an illegal date/time read from the RTC hardware.
When calling rtc_tm_to_ktime later, the result may be a very large value
(possibly KTIME_MAX). If there are periodic timers in rtc->timerqueue,
they will continually expire, may causing kernel softlockup.
Metrics
Affected Vendors & Products
References
History
Tue, 07 Jan 2025 21:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Linux
Linux linux Kernel |
|
Weaknesses | CWE-908 | |
CPEs | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
Vendors & Products |
Linux
Linux linux Kernel |
Tue, 31 Dec 2024 02:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Sun, 29 Dec 2024 11:45:00 +0000
MITRE
Status: PUBLISHED
Assigner: Linux
Published: 2024-12-29T11:30:08.512Z
Updated: 2024-12-29T11:30:08.512Z
Reserved: 2024-12-29T11:26:39.757Z
Link: CVE-2024-56739
Vulnrichment
No data.
NVD
Status : Analyzed
Published: 2024-12-29T12:15:07.240
Modified: 2025-01-07T21:21:31.403
Link: CVE-2024-56739
Redhat