In the Linux kernel, the following vulnerability has been resolved:
net: enetc: VFs do not support HWTSTAMP_TX_ONESTEP_SYNC
Actually ENETC VFs do not support HWTSTAMP_TX_ONESTEP_SYNC because only
ENETC PF can access PMa_SINGLE_STEP registers. And there will be a crash
if VFs are used to test one-step timestamp, the crash log as follows.
[ 129.110909] Unable to handle kernel paging request at virtual address 00000000000080c0
[ 129.287769] Call trace:
[ 129.290219] enetc_port_mac_wr+0x30/0xec (P)
[ 129.294504] enetc_start_xmit+0xda4/0xe74
[ 129.298525] enetc_xmit+0x70/0xec
[ 129.301848] dev_hard_start_xmit+0x98/0x118
References
Configurations
Configuration 1 (hide)
|
History
31 Oct 2025, 18:50
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
| Summary |
|
|
| First Time |
Linux
Linux linux Kernel |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CWE | NVD-CWE-noinfo | |
| References | () https://git.kernel.org/stable/c/1748531839298ab7be682155f6cd98ae04773e6a - Patch | |
| References | () https://git.kernel.org/stable/c/3d9634211121700568d0e3635ebdd5df06d20440 - Patch | |
| References | () https://git.kernel.org/stable/c/8c393efd7420cc994864d059fcc6219bfd7cb840 - Patch | |
| References | () https://git.kernel.org/stable/c/a562d0c4a893eae3ea51d512c4d90ab858a6b7ec - Patch |
01 Apr 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-04-01 16:15
Updated : 2025-10-31 18:50
NVD link : CVE-2025-21894
Mitre link : CVE-2025-21894
CVE.ORG link : CVE-2025-21894
JSON object : View
Products Affected
linux
- linux_kernel
CWE
