First published: Sun Dec 29 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: rtc: check if __rtc_read_time was successful in rtc_timer_do_work() If the __rtc_read_time call fails,, the struct rtc_time tm; may contain uninitialized data, or an illegal date/time read from the RTC hardware. When calling rtc_tm_to_ktime later, the result may be a very large value (possibly KTIME_MAX). If there are periodic timers in rtc->timerqueue, they will continually expire, may causing kernel softlockup.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | >=2.6.38<4.19.325 | |
Linux Linux kernel | >=4.20<5.4.287 | |
Linux Linux kernel | >=5.5<5.10.231 | |
Linux Linux kernel | >=5.11<5.15.174 | |
Linux Linux kernel | >=5.16<6.1.120 | |
Linux Linux kernel | >=6.2<6.6.64 | |
Linux Linux kernel | >=6.7<6.11.11 | |
Linux Linux kernel | >=6.12<6.12.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.