CVE-2026-5072 PUBLISHED

ptp: Potential Denial of Service via PTP Interval Shift

Assigner: zephyr
Reserved: 27.03.2026 Published: 22.05.2026 Updated: 22.05.2026

A bitwise shift vulnerability in Zephyr's PTP subsystem allows a remote attacker to cause undefined behavior and potential system crashes. An attacker sends a crafted PTP_MSG_MANAGEMENT message to set an unvalidated negative log_announce_interval value in the port's data set. When a subsequent PTP_MSG_ANNOUNCE message is processed, port_timer_set_timeout_random computes a timeout as NSEC_PER_SEC >> -log_seconds; if the attacker-supplied value is sufficiently negative (e.g., -127), the shift amount exceeds the 64-bit integer width, triggering undefined behavior in C. This can cause a system crash via a compiler-generated illegal instruction trap on some architectures, or produce an erroneous zero timeout leading to resource starvation loops or other logical errors.

Product Status

Vendor zephyrproject-rtos
Product Zephyr
Versions Default: unaffected
  • affected from * to 4.3 (incl.)

References