CVE-2024-56739

Source
https://cve.org/CVERecord?id=CVE-2024-56739
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-56739.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-56739
Downstream
Related
Published
2024-12-29T11:30:08.512Z
Modified
2026-03-20T12:41:00.090754Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
rtc: check if __rtc_read_time was successful in rtc_timer_do_work()
Details

In the Linux kernel, the following vulnerability has been resolved:

rtc: check if _rtcreadtime was successful in rtctimerdowork()

If the _rtcreadtime call fails,, the struct rtctime tm; may contain uninitialized data, or an illegal date/time read from the RTC hardware.

When calling rtctmtoktime later, the result may be a very large value (possibly KTIMEMAX). If there are periodic timers in rtc->timerqueue, they will continually expire, may causing kernel softlockup.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/56xxx/CVE-2024-56739.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
6610e0893b8bc6f59b14fed7f089c5997f035f88
Fixed
39ad0a1ae17b54509cd9e93dcd8cec16e7c12d3f
Fixed
44b3257ff705d63d5f00ef8ed314a0eeb7ec37f2
Fixed
0d68e8514d9040108ff7d1b37ca71096674b6efe
Fixed
246f621d363988e7040f4546d20203dc713fa3e1
Fixed
fde56535505dde3336df438e949ef4742b6d6d6e
Fixed
dd4b1cbcc916fad5d10c2662b62def9f05e453d4
Fixed
a1f0b4af90cc18b10261ecde56c6a56b22c75bd1
Fixed
e77bce0a8c3989b4173c36f4195122bca8f4a3e1
Fixed
e8ba8a2bc4f60a1065f23d6a0e7cbea945a0f40d

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-56739.json"