CVE-2024-50195

MEDIUM

Linux Kernel < 4.19.323 - Improper Condition Check

Title source: rule
STIX 2.1

Description

In the Linux kernel, the following vulnerability has been resolved: posix-clock: Fix missing timespec64 check in pc_clock_settime() As Andrew pointed out, it will make sense that the PTP core checked timespec64 struct's tv_sec and tv_nsec range before calling ptp->info->settime64(). As the man manual of clock_settime() said, if tp.tv_sec is negative or tp.tv_nsec is outside the range [0..999,999,999], it should return EINVAL, which include dynamic clocks which handles PTP clock, and the condition is consistent with timespec64_valid(). As Thomas suggested, timespec64_valid() only check the timespec is valid, but not ensure that the time is in a valid range, so check it ahead using timespec64_valid_strict() in pc_clock_settime() and return -EINVAL if not valid. There are some drivers that use tp->tv_sec and tp->tv_nsec directly to write registers without validity checks and assume that the higher layer has checked it, which is dangerous and will benefit from this, such as hclge_ptp_settime(), igb_ptp_settime_i210(), _rcar_gen4_ptp_settime(), and some drivers can remove the checks of itself.

Scores

CVSS v3 5.5
EPSS 0.0001
EPSS Percentile 2.5%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-754
Status published
Products (9)
linux/Kernel 2.6.39 - 4.19.323linux
linux/Kernel 4.20.0 - 5.4.285linux
linux/Kernel 5.11.0 - 5.15.169linux
linux/Kernel 5.16.0 - 6.1.114linux
linux/Kernel 5.5.0 - 5.10.228linux
linux/Kernel 6.2.0 - 6.6.58linux
linux/Kernel 6.7.0 - 6.11.5linux
linux/linux_kernel 6.12 rc1 (3 CPE variants)
linux/linux_kernel 2.6.39 - 4.19.323
Published Nov 08, 2024
Tracked Since Feb 18, 2026