Resolved vulnerability in Linux kernel's posix-clock
CVE-2024-50195

5.5MEDIUM

Key Information:

Vendor

Linux

Status
Vendor
CVE Published:
8 November 2024

What is CVE-2024-50195?

In the Linux kernel, the following vulnerability has been resolved:

posix-clock: Fix missing timespec64 check in pc_clock_settime()

As Andrew pointed out, it will make sense that the PTP core checked timespec64 struct's tv_sec and tv_nsec range before calling ptp->info->settime64().

As the man manual of clock_settime() said, if tp.tv_sec is negative or tp.tv_nsec is outside the range [0..999,999,999], it should return EINVAL, which include dynamic clocks which handles PTP clock, and the condition is consistent with timespec64_valid(). As Thomas suggested, timespec64_valid() only check the timespec is valid, but not ensure that the time is in a valid range, so check it ahead using timespec64_valid_strict() in pc_clock_settime() and return -EINVAL if not valid.

There are some drivers that use tp->tv_sec and tp->tv_nsec directly to write registers without validity checks and assume that the higher layer has checked it, which is dangerous and will benefit from this, such as hclge_ptp_settime(), igb_ptp_settime_i210(), _rcar_gen4_ptp_settime(), and some drivers can remove the checks of itself.

Affected Version(s)

Linux 0606f422b453f76c31ab2b1bd52943ff06a2dcf2 < 29f085345cde24566efb751f39e5d367c381c584

Linux 0606f422b453f76c31ab2b1bd52943ff06a2dcf2

Linux 0606f422b453f76c31ab2b1bd52943ff06a2dcf2 < 673a1c5a2998acbd429d6286e6cad10f17f4f073

References

CVSS V3.1

Score:
5.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.