CVE-2024-50210
posix-clock: posix-clock: Fix unbalanced locking in pc_clock_settime()
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
In the Linux kernel, the following vulnerability has been resolved: posix-clock: posix-clock: Fix unbalanced locking in pc_clock_settime() If get_clock_desc() succeeds, it calls fget() for the clockid's fd,
and get the clk->rwsem read lock, so the error path should release
the lock to make the lock balance and fput the clockid's fd to make
the refcount balance and release the fd related resource. However the below commit left the error path locked behind resulting in
unbalanced locking. Check timespec64_valid_strict() before
get_clock_desc() to fix it, because the "ts" is not changed
after that. [pabeni@redhat.com: fixed commit message typo]
In the Linux kernel, the following vulnerability has been resolved: posix-clock: posix-clock: Fix unbalanced locking in pc_clock_settime() If get_clock_desc() succeeds, it calls fget() for the clockid's fd, and get the clk->rwsem read lock, so the error path should release the lock to make the lock balance and fput the clockid's fd to make the refcount balance and release the fd related resource. However the below commit left the error path locked behind resulting in unbalanced locking. Check timespec64_valid_strict() before get_clock_desc() to fix it, because the "ts" is not changed after that. [pabeni@redhat.com: fixed commit message typo]
CVSS Scores
SSVC
- Decision:-
Timeline
- 2024-10-21 CVE Reserved
- 2024-11-08 CVE Published
- 2024-12-19 CVE Updated
- 2025-03-18 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (13)
URL | Tag | Source |
---|---|---|
https://git.kernel.org/stable/c/673a1c5a2998acbd429d6286e6cad10f17f4f073 | Vuln. Introduced | |
https://git.kernel.org/stable/c/c8789fbe2bbf75845e45302cba6ffa44e1884d01 | Vuln. Introduced | |
https://git.kernel.org/stable/c/27abbde44b6e71ee3891de13e1a228aa7ce95bfe | Vuln. Introduced | |
https://git.kernel.org/stable/c/a3f169e398215e71361774d13bf91a0101283ac2 | Vuln. Introduced | |
https://git.kernel.org/stable/c/1ff7247101af723731ea42ed565d54fb8f341264 | Vuln. Introduced |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 5.10.228 < 5.10.229 Search vendor "Linux" for product "Linux Kernel" and version " >= 5.10.228 < 5.10.229" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 5.15.169 < 5.15.170 Search vendor "Linux" for product "Linux Kernel" and version " >= 5.15.169 < 5.15.170" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 6.1.114 < 6.1.115 Search vendor "Linux" for product "Linux Kernel" and version " >= 6.1.114 < 6.1.115" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 6.6.58 < 6.6.59 Search vendor "Linux" for product "Linux Kernel" and version " >= 6.6.58 < 6.6.59" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 6.11.5 < 6.11.6 Search vendor "Linux" for product "Linux Kernel" and version " >= 6.11.5 < 6.11.6" | en |
Affected
|