CVE-2025-21814

In the Linux kernel, the following vulnerability has been resolved: ptp: Ensure info->enable callback is always set The ioctl and sysfs handlers unconditionally call the ->enable callback. Not all drivers implement that callback, leading to NULL dereferences. Example of affected drivers: ptp_s390.c, ptp_vclock.c and ptp_mock.c. Instead use a dummy callback if no better was specified by the driver.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

13 Mar 2025, 13:15

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ptp: Asegúrese de que la devolución de llamada info->enable esté siempre establecida Los controladores ioctl y sysfs llaman incondicionalmente a la devolución de llamada ->enable. No todos los controladores implementan esa devolución de llamada, lo que lleva a desreferencias NULL. Ejemplo de controladores afectados: ptp_s390.c, ptp_vclock.c y ptp_mock.c. En su lugar, utilice una devolución de llamada ficticia si el controlador no especificó nada mejor.
First Time Linux linux Kernel
Linux
References
  • () https://git.kernel.org/stable/c/1334c64a5d1de6666e0c9f984db6745083df1eb4 -
  • () https://git.kernel.org/stable/c/9df3a9284f39bfd51a9f72a6a165c79e2aa5066b -
  • () https://git.kernel.org/stable/c/fdc1e72487781dd7705bcbe30878bee7d5d1f3e8 -
References () https://git.kernel.org/stable/c/5d1041c76de656f9f8d5a192218039a9acf9bd00 - () https://git.kernel.org/stable/c/5d1041c76de656f9f8d5a192218039a9acf9bd00 - Patch
References () https://git.kernel.org/stable/c/755caf4ee1c615ee5717862e427124370f46b1f3 - () https://git.kernel.org/stable/c/755caf4ee1c615ee5717862e427124370f46b1f3 - Patch
References () https://git.kernel.org/stable/c/81846070cba17125a866e8023c01d3465b153339 - () https://git.kernel.org/stable/c/81846070cba17125a866e8023c01d3465b153339 - Patch
References () https://git.kernel.org/stable/c/8441aea46445252df5d2eed6deb6d5246fc24002 - () https://git.kernel.org/stable/c/8441aea46445252df5d2eed6deb6d5246fc24002 - Patch
References () https://git.kernel.org/stable/c/fd53aa40e65f518453115b6f56183b0c201db26b - () https://git.kernel.org/stable/c/fd53aa40e65f518453115b6f56183b0c201db26b - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-476

27 Feb 2025, 20:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-27 20:16

Updated : 2025-03-13 13:15


NVD link : CVE-2025-21814

Mitre link : CVE-2025-21814

CVE.ORG link : CVE-2025-21814


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference