Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2024-56739
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-29 Dec, 2024 | 11:30
Updated At-03 Nov, 2025 | 20:53
Rejected At-
▼CVE Numbering Authority (CNA)
rtc: check if __rtc_read_time was successful in rtc_timer_do_work()

In the Linux kernel, the following vulnerability has been resolved: rtc: check if __rtc_read_time was successful in rtc_timer_do_work() If the __rtc_read_time call fails,, the struct rtc_time tm; may contain uninitialized data, or an illegal date/time read from the RTC hardware. When calling rtc_tm_to_ktime later, the result may be a very large value (possibly KTIME_MAX). If there are periodic timers in rtc->timerqueue, they will continually expire, may causing kernel softlockup.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/rtc/interface.c
Default Status
unaffected
Versions
Affected
  • From 6610e0893b8bc6f59b14fed7f089c5997f035f88 before 39ad0a1ae17b54509cd9e93dcd8cec16e7c12d3f (git)
  • From 6610e0893b8bc6f59b14fed7f089c5997f035f88 before 44b3257ff705d63d5f00ef8ed314a0eeb7ec37f2 (git)
  • From 6610e0893b8bc6f59b14fed7f089c5997f035f88 before 0d68e8514d9040108ff7d1b37ca71096674b6efe (git)
  • From 6610e0893b8bc6f59b14fed7f089c5997f035f88 before 246f621d363988e7040f4546d20203dc713fa3e1 (git)
  • From 6610e0893b8bc6f59b14fed7f089c5997f035f88 before fde56535505dde3336df438e949ef4742b6d6d6e (git)
  • From 6610e0893b8bc6f59b14fed7f089c5997f035f88 before dd4b1cbcc916fad5d10c2662b62def9f05e453d4 (git)
  • From 6610e0893b8bc6f59b14fed7f089c5997f035f88 before a1f0b4af90cc18b10261ecde56c6a56b22c75bd1 (git)
  • From 6610e0893b8bc6f59b14fed7f089c5997f035f88 before e77bce0a8c3989b4173c36f4195122bca8f4a3e1 (git)
  • From 6610e0893b8bc6f59b14fed7f089c5997f035f88 before e8ba8a2bc4f60a1065f23d6a0e7cbea945a0f40d (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/rtc/interface.c
Default Status
affected
Versions
Affected
  • 2.6.38
Unaffected
  • From 0 before 2.6.38 (semver)
  • From 4.19.325 through 4.19.* (semver)
  • From 5.4.287 through 5.4.* (semver)
  • From 5.10.231 through 5.10.* (semver)
  • From 5.15.174 through 5.15.* (semver)
  • From 6.1.120 through 6.1.* (semver)
  • From 6.6.64 through 6.6.* (semver)
  • From 6.11.11 through 6.11.* (semver)
  • From 6.12.2 through 6.12.* (semver)
  • From 6.13 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/39ad0a1ae17b54509cd9e93dcd8cec16e7c12d3f
N/A
https://git.kernel.org/stable/c/44b3257ff705d63d5f00ef8ed314a0eeb7ec37f2
N/A
https://git.kernel.org/stable/c/0d68e8514d9040108ff7d1b37ca71096674b6efe
N/A
https://git.kernel.org/stable/c/246f621d363988e7040f4546d20203dc713fa3e1
N/A
https://git.kernel.org/stable/c/fde56535505dde3336df438e949ef4742b6d6d6e
N/A
https://git.kernel.org/stable/c/dd4b1cbcc916fad5d10c2662b62def9f05e453d4
N/A
https://git.kernel.org/stable/c/a1f0b4af90cc18b10261ecde56c6a56b22c75bd1
N/A
https://git.kernel.org/stable/c/e77bce0a8c3989b4173c36f4195122bca8f4a3e1
N/A
https://git.kernel.org/stable/c/e8ba8a2bc4f60a1065f23d6a0e7cbea945a0f40d
N/A
Hyperlink: https://git.kernel.org/stable/c/39ad0a1ae17b54509cd9e93dcd8cec16e7c12d3f
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/44b3257ff705d63d5f00ef8ed314a0eeb7ec37f2
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/0d68e8514d9040108ff7d1b37ca71096674b6efe
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/246f621d363988e7040f4546d20203dc713fa3e1
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/fde56535505dde3336df438e949ef4742b6d6d6e
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/dd4b1cbcc916fad5d10c2662b62def9f05e453d4
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/a1f0b4af90cc18b10261ecde56c6a56b22c75bd1
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/e77bce0a8c3989b4173c36f4195122bca8f4a3e1
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/e8ba8a2bc4f60a1065f23d6a0e7cbea945a0f40d
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CISA ADP Vulnrichment
Affected Products
Problem Types
TypeCWE IDDescription
CWECWE-908CWE-908 Use of Uninitialized Resource
Type: CWE
CWE ID: CWE-908
Description: CWE-908 Use of Uninitialized Resource
Metrics
VersionBase scoreBase severityVector
3.15.5MEDIUM
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Version: 3.1
Base score: 5.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
2. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html
N/A
https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html
N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html
Resource: N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html
Resource: N/A
Details not found