Home

Description

In the Linux kernel, the following vulnerability has been resolved: ptp: Add a upper bound on max_vclocks syzbot reported WARNING in max_vclocks_store. This occurs when the argument max is too large for kcalloc to handle. Extend the guard to guard against values that are too large for kcalloc

PUBLISHED Reserved 2025-04-16 | Published 2025-10-28 | Updated 2025-10-28 | Assigner Linux

Product status

Default status
unaffected

73f37068d540eba5f93ba3a0019bf479d35ebd76 (git) before 8dd446056336faa2283d62cefc2f576536845edc
affected

73f37068d540eba5f93ba3a0019bf479d35ebd76 (git) before 35ce5f163889dbce88eda1df661b357a09bbed87
affected

73f37068d540eba5f93ba3a0019bf479d35ebd76 (git) before e9f35294e18da82162004a2f35976e7031aaf7f9
affected

Default status
affected

5.14
affected

Any version before 5.14
unaffected

6.12.53 (semver)
unaffected

6.17.3 (semver)
unaffected

6.18-rc1 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/8dd446056336faa2283d62cefc2f576536845edc

git.kernel.org/...c/35ce5f163889dbce88eda1df661b357a09bbed87

git.kernel.org/...c/e9f35294e18da82162004a2f35976e7031aaf7f9

cve.org (CVE-2025-40057)

nvd.nist.gov (CVE-2025-40057)

Download JSON