製品・ソフトウェアに関する情報
Linux の Linux Kernel 等複数ベンダの製品における脆弱性
Title Linux の Linux Kernel 等複数ベンダの製品における脆弱性
Summary

Linux の Linux Kernel 等複数ベンダの製品には、不特定の脆弱性が存在します。

Possible impacts サービス運用妨害 (DoS) 状態にされる可能性があります。 
Solution

ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。

Publication Date June 5, 2025, midnight
Registration Date Dec. 25, 2025, 11:39 a.m.
Last Update Dec. 25, 2025, 11:39 a.m.
CVSS3.0 : 警告
Score 5.5
Vector CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected System
Debian
Debian GNU/Linux 11.0
Linux
Linux Kernel 5.14
Linux Kernel 5.14.1 以上 5.15.186 未満
Linux Kernel 5.16 以上 6.1.142 未満
Linux Kernel 6.13 以上 6.15.3 未満
Linux Kernel 6.16
Linux Kernel 6.2 以上 6.6.94 未満
Linux Kernel 6.7 以上 6.12.34 未満
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
No Changed Details Date of change
1 [2025年12月25日]
  掲載
Dec. 25, 2025, 11:39 a.m.

NVD Vulnerability Information
CVE-2025-38305
Summary

In the Linux kernel, the following vulnerability has been resolved:

ptp: remove ptp->n_vclocks check logic in ptp_vclock_in_use()

There is no disagreement that we should check both ptp->is_virtual_clock
and ptp->n_vclocks to check if the ptp virtual clock is in use.

However, when we acquire ptp->n_vclocks_mux to read ptp->n_vclocks in
ptp_vclock_in_use(), we observe a recursive lock in the call trace
starting from n_vclocks_store().

============================================
WARNING: possible recursive locking detected
6.15.0-rc6 #1 Not tainted
--------------------------------------------
syz.0.1540/13807 is trying to acquire lock:
ffff888035a24868 (&ptp->n_vclocks_mux){+.+.}-{4:4}, at:
ptp_vclock_in_use drivers/ptp/ptp_private.h:103 [inline]
ffff888035a24868 (&ptp->n_vclocks_mux){+.+.}-{4:4}, at:
ptp_clock_unregister+0x21/0x250 drivers/ptp/ptp_clock.c:415

but task is already holding lock:
ffff888030704868 (&ptp->n_vclocks_mux){+.+.}-{4:4}, at:
n_vclocks_store+0xf1/0x6d0 drivers/ptp/ptp_sysfs.c:215

other info that might help us debug this:
Possible unsafe locking scenario:

CPU0
----
lock(&ptp->n_vclocks_mux);
lock(&ptp->n_vclocks_mux);

*** DEADLOCK ***
....
============================================

The best way to solve this is to remove the logic that checks
ptp->n_vclocks in ptp_vclock_in_use().

The reason why this is appropriate is that any path that uses
ptp->n_vclocks must unconditionally check if ptp->n_vclocks is greater
than 0 before unregistering vclocks, and all functions are already
written this way. And in the function that uses ptp->n_vclocks, we
already get ptp->n_vclocks_mux before unregistering vclocks.

Therefore, we need to remove the redundant check for ptp->n_vclocks in
ptp_vclock_in_use() to prevent recursive locking.

Publication Date July 10, 2025, 5:15 p.m.
Registration Date July 11, 2025, 4 a.m.
Last Update July 10, 2025, 5:15 p.m.
Related information, measures and tools
Common Vulnerabilities List