๐Ÿ” CVE Alert

CVE-2024-56739

MEDIUM 5.5

rtc: check if __rtc_read_time was successful in rtc_timer_do_work()

CVSS Score
5.5
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: rtc: check if __rtc_read_time was successful in rtc_timer_do_work() If the __rtc_read_time call fails,, the struct rtc_time tm; may contain uninitialized data, or an illegal date/time read from the RTC hardware. When calling rtc_tm_to_ktime later, the result may be a very large value (possibly KTIME_MAX). If there are periodic timers in rtc->timerqueue, they will continually expire, may causing kernel softlockup.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Dec 29, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new medium vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
6610e0893b8bc6f59b14fed7f089c5997f035f88 < 39ad0a1ae17b54509cd9e93dcd8cec16e7c12d3f 6610e0893b8bc6f59b14fed7f089c5997f035f88 < 44b3257ff705d63d5f00ef8ed314a0eeb7ec37f2 6610e0893b8bc6f59b14fed7f089c5997f035f88 < 0d68e8514d9040108ff7d1b37ca71096674b6efe 6610e0893b8bc6f59b14fed7f089c5997f035f88 < 246f621d363988e7040f4546d20203dc713fa3e1 6610e0893b8bc6f59b14fed7f089c5997f035f88 < fde56535505dde3336df438e949ef4742b6d6d6e 6610e0893b8bc6f59b14fed7f089c5997f035f88 < dd4b1cbcc916fad5d10c2662b62def9f05e453d4 6610e0893b8bc6f59b14fed7f089c5997f035f88 < a1f0b4af90cc18b10261ecde56c6a56b22c75bd1 6610e0893b8bc6f59b14fed7f089c5997f035f88 < e77bce0a8c3989b4173c36f4195122bca8f4a3e1 6610e0893b8bc6f59b14fed7f089c5997f035f88 < e8ba8a2bc4f60a1065f23d6a0e7cbea945a0f40d
Linux / Linux
2.6.38

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/39ad0a1ae17b54509cd9e93dcd8cec16e7c12d3f git.kernel.org: https://git.kernel.org/stable/c/44b3257ff705d63d5f00ef8ed314a0eeb7ec37f2 git.kernel.org: https://git.kernel.org/stable/c/0d68e8514d9040108ff7d1b37ca71096674b6efe git.kernel.org: https://git.kernel.org/stable/c/246f621d363988e7040f4546d20203dc713fa3e1 git.kernel.org: https://git.kernel.org/stable/c/fde56535505dde3336df438e949ef4742b6d6d6e git.kernel.org: https://git.kernel.org/stable/c/dd4b1cbcc916fad5d10c2662b62def9f05e453d4 git.kernel.org: https://git.kernel.org/stable/c/a1f0b4af90cc18b10261ecde56c6a56b22c75bd1 git.kernel.org: https://git.kernel.org/stable/c/e77bce0a8c3989b4173c36f4195122bca8f4a3e1 git.kernel.org: https://git.kernel.org/stable/c/e8ba8a2bc4f60a1065f23d6a0e7cbea945a0f40d lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html