CVE-2025-40298
Awaiting Analysis Awaiting Analysis - Queue
BaseFortify

Publication date: 2025-12-08

Last updated on: 2025-12-08

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: gve: Implement settime64 with -EOPNOTSUPP ptp_clock_settime() assumes every ptp_clock has implemented settime64(). Stub it with -EOPNOTSUPP to prevent a NULL dereference.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-08
Last Modified
2025-12-08
Generated
2026-05-07
AI Q&A
2025-12-08
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability occurs in the Linux kernel where the function ptp_clock_settime() assumes that every ptp_clock has implemented the settime64() function. However, if settime64() is not implemented, this can lead to a NULL pointer dereference. The fix involves stubbing settime64() with an error code (-EOPNOTSUPP) to prevent this NULL dereference.


How can this vulnerability impact me? :

The vulnerability can cause a NULL pointer dereference in the Linux kernel, which may lead to system crashes or instability when ptp_clock_settime() is called on a ptp_clock without settime64() implemented.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart