| Title | Linux の Linux Kernel 等複数ベンダの製品における脆弱性 |
|---|---|
| Summary | Linux の Linux Kernel 等複数ベンダの製品には、不特定の脆弱性が存在します。 |
| Possible impacts | サービス運用妨害 (DoS) 状態にされる可能性があります。 |
| Solution | ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date | June 5, 2025, midnight |
| Registration Date | Dec. 25, 2025, 11:39 a.m. |
| Last Update | Dec. 25, 2025, 11:39 a.m. |
| CVSS3.0 : 警告 | |
| Score | 5.5 |
|---|---|
| Vector | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
| Debian |
| Debian GNU/Linux 11.0 |
| Linux |
| Linux Kernel 5.14 |
| Linux Kernel 5.14.1 以上 5.15.186 未満 |
| Linux Kernel 5.16 以上 6.1.142 未満 |
| Linux Kernel 6.13 以上 6.15.3 未満 |
| Linux Kernel 6.16 |
| Linux Kernel 6.2 以上 6.6.94 未満 |
| Linux Kernel 6.7 以上 6.12.34 未満 |
| No | Changed Details | Date of change |
|---|---|---|
| 1 | [2025年12月25日] 掲載 |
Dec. 25, 2025, 11:39 a.m. |
| Summary | In the Linux kernel, the following vulnerability has been resolved: ptp: remove ptp->n_vclocks check logic in ptp_vclock_in_use() There is no disagreement that we should check both ptp->is_virtual_clock However, when we acquire ptp->n_vclocks_mux to read ptp->n_vclocks in ============================================ but task is already holding lock: other info that might help us debug this: CPU0 *** DEADLOCK *** The best way to solve this is to remove the logic that checks The reason why this is appropriate is that any path that uses Therefore, we need to remove the redundant check for ptp->n_vclocks in |
|---|---|
| Publication Date | July 10, 2025, 5:15 p.m. |
| Registration Date | July 11, 2025, 4 a.m. |
| Last Update | July 10, 2025, 5:15 p.m. |