Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-40057

Опубликовано: 28 окт. 2025
Источник: debian

Описание

In the Linux kernel, the following vulnerability has been resolved: ptp: Add a upper bound on max_vclocks syzbot reported WARNING in max_vclocks_store. This occurs when the argument max is too large for kcalloc to handle. Extend the guard to guard against values that are too large for kcalloc

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed6.17.6-1package
linuxfixed6.12.57-1trixiepackage
linuxnot-affectedbullseyepackage

Примечания

  • https://git.kernel.org/linus/e9f35294e18da82162004a2f35976e7031aaf7f9 (6.18-rc1)

Связанные уязвимости

ubuntu
3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: ptp: Add a upper bound on max_vclocks syzbot reported WARNING in max_vclocks_store. This occurs when the argument max is too large for kcalloc to handle. Extend the guard to guard against values that are too large for kcalloc

nvd
3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: ptp: Add a upper bound on max_vclocks syzbot reported WARNING in max_vclocks_store. This occurs when the argument max is too large for kcalloc to handle. Extend the guard to guard against values that are too large for kcalloc

msrc
около 2 месяцев назад

ptp: Add a upper bound on max_vclocks

github
3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: ptp: Add a upper bound on max_vclocks syzbot reported WARNING in max_vclocks_store. This occurs when the argument max is too large for kcalloc to handle. Extend the guard to guard against values that are too large for kcalloc

CVSS3: 5.5
fstec
4 месяца назад

Уязвимость функции max_vclocks_store() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании