Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-40057

Опубликовано: 28 окт. 2025
Источник: redhat
CVSS3: 5.5
EPSS Низкий

Описание

In the Linux kernel, the following vulnerability has been resolved: ptp: Add a upper bound on max_vclocks syzbot reported WARNING in max_vclocks_store. This occurs when the argument max is too large for kcalloc to handle. Extend the guard to guard against values that are too large for kcalloc

A flaw was found in the Linux kernel's PTP (Precision Time Protocol) subsystem. In max_vclocks_store(), when a user provides an excessively large value for the maximum number of virtual clocks, the subsequent kcalloc() call cannot handle the allocation request, triggering a kernel WARNING. A local user with access to the PTP sysfs interface could exploit this to cause a denial of service.

Отчет

This vulnerability requires local access and permissions to write to PTP sysfs attributes. The impact is limited to triggering a kernel warning and potential denial of service. Systems not using PTP virtual clocks are not affected.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10kernelFix deferred
Red Hat Enterprise Linux 6kernelOut of support scope
Red Hat Enterprise Linux 7kernelNot affected
Red Hat Enterprise Linux 7kernel-rtNot affected
Red Hat Enterprise Linux 8kernelNot affected
Red Hat Enterprise Linux 8kernel-rtNot affected
Red Hat Enterprise Linux 9kernelFix deferred
Red Hat Enterprise Linux 9kernel-rtFix deferred

Показывать по

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=2406752kernel: ptp: Add a upper bound on max_vclocks

EPSS

Процентиль: 5%
0.0002
Низкий

5.5 Medium

CVSS3

Связанные уязвимости

ubuntu
5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: ptp: Add a upper bound on max_vclocks syzbot reported WARNING in max_vclocks_store. This occurs when the argument max is too large for kcalloc to handle. Extend the guard to guard against values that are too large for kcalloc

nvd
5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: ptp: Add a upper bound on max_vclocks syzbot reported WARNING in max_vclocks_store. This occurs when the argument max is too large for kcalloc to handle. Extend the guard to guard against values that are too large for kcalloc

msrc
4 месяца назад

ptp: Add a upper bound on max_vclocks

debian
5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: p ...

github
5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: ptp: Add a upper bound on max_vclocks syzbot reported WARNING in max_vclocks_store. This occurs when the argument max is too large for kcalloc to handle. Extend the guard to guard against values that are too large for kcalloc

EPSS

Процентиль: 5%
0.0002
Низкий

5.5 Medium

CVSS3