Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-40057

Опубликовано: 28 окт. 2025
Источник: debian

Описание

In the Linux kernel, the following vulnerability has been resolved: ptp: Add a upper bound on max_vclocks syzbot reported WARNING in max_vclocks_store. This occurs when the argument max is too large for kcalloc to handle. Extend the guard to guard against values that are too large for kcalloc

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed6.17.6-1package
linuxfixed6.12.57-1trixiepackage
linuxnot-affectedbullseyepackage

Примечания

  • https://git.kernel.org/linus/e9f35294e18da82162004a2f35976e7031aaf7f9 (6.18-rc1)

Связанные уязвимости

ubuntu
13 дней назад

In the Linux kernel, the following vulnerability has been resolved: ptp: Add a upper bound on max_vclocks syzbot reported WARNING in max_vclocks_store. This occurs when the argument max is too large for kcalloc to handle. Extend the guard to guard against values that are too large for kcalloc

nvd
13 дней назад

In the Linux kernel, the following vulnerability has been resolved: ptp: Add a upper bound on max_vclocks syzbot reported WARNING in max_vclocks_store. This occurs when the argument max is too large for kcalloc to handle. Extend the guard to guard against values that are too large for kcalloc

msrc
12 дней назад

ptp: Add a upper bound on max_vclocks

github
13 дней назад

In the Linux kernel, the following vulnerability has been resolved: ptp: Add a upper bound on max_vclocks syzbot reported WARNING in max_vclocks_store. This occurs when the argument max is too large for kcalloc to handle. Extend the guard to guard against values that are too large for kcalloc

CVSS3: 5.5
fstec
около 2 месяцев назад

Уязвимость функции max_vclocks_store() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании