Home

Description

In the Linux kernel, the following vulnerability has been resolved: idpf: cleanup remaining SKBs in PTP flows When the driver requests Tx timestamp value, one of the first steps is to clone SKB using skb_get. It increases the reference counter for that SKB to prevent unexpected freeing by another component. However, there may be a case where the index is requested, SKB is assigned and never consumed by PTP flows - for example due to reset during running PTP apps. Add a check in release timestamping function to verify if the SKB assigned to Tx timestamp latch was freed, and release remaining SKBs.

PUBLISHED Reserved 2025-04-16 | Published 2025-11-12 | Updated 2025-12-01 | Assigner Linux

Product status

Default status
unaffected

4901e83a94ef0a8baf27916f31daf59b0a68547f (git) before 2c84e91ef831d4fedb0b94670b3cfd1cc5f966a5
affected

4901e83a94ef0a8baf27916f31daf59b0a68547f (git) before a3f8c0a273120fd2638f03403e786c3de2382e72
affected

Default status
affected

6.16
affected

Any version before 6.16
unaffected

6.17.5 (semver)
unaffected

6.18 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/2c84e91ef831d4fedb0b94670b3cfd1cc5f966a5

git.kernel.org/...c/a3f8c0a273120fd2638f03403e786c3de2382e72

cve.org (CVE-2025-40175)

nvd.nist.gov (CVE-2025-40175)

Download JSON