CVE-2025-40299
Description
In the Linux kernel, the following vulnerability has been resolved:
gve: Implement gettimex64 with -EOPNOTSUPP
gve implemented a ptp_clock for sole use of do_aux_work at this time. ptp_clock_gettime() and ptp_sys_offset() assume every ptp_clock has implemented either gettimex64 or gettime64. Stub gettimex64 and return -EOPNOTSUPP to prevent NULL dereferencing.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In the Linux kernel's GVE driver, a missing gettimex64 implementation for the PTP clock caused a NULL pointer dereference; fixed by stubbing the function to return -EOPNOTSUPP.
Vulnerability
The GVE (Google Virtual Ethernet) driver in the Linux kernel registered a PTP clock device solely for the purpose of do_aux_work, but did not implement the gettimex64 or gettime64 callbacks. Functions such as ptp_clock_gettime() and ptp_sys_offset() assume that every PTP clock provides at least one of these time‑retrieval methods. Without a stub, a NULL pointer is dereferenced when the kernel attempts to call the missing function [1].
Exploitation
An attacker could trigger the vulnerability by invoking any operation that queries the PTP time from the GVE device. This requires local access to the system and the ability to interact with the PTP subsystem (typically requiring root privileges or appropriate permissions). No special network position is needed because the bug resides in the kernel driver stack [1].
Impact
A successful trigger results in a NULL pointer dereference, causing a kernel panic (denial of service). There is no indication of memory corruption or privilege escalation beyond the crash [1].
Mitigation
The fix has been merged into the Linux kernel stable tree as commit 6ab753b5d8e52. Users should update to a kernel version that includes this commit. No workarounds are documented; the only safe resolution is to apply the patch [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
296ec90412ceb6ab753b5d8e5Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
2News mentions
0No linked articles in our index yet.