CVE-2025-21814
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
27/02/2025
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ptp: Ensure info->enable callback is always set<br />
<br />
The ioctl and sysfs handlers unconditionally call the ->enable callback.<br />
Not all drivers implement that callback, leading to NULL dereferences.<br />
Example of affected drivers: ptp_s390.c, ptp_vclock.c and ptp_mock.c.<br />
<br />
Instead use a dummy callback if no better was specified by the driver.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.0 (including) | 6.1.129 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.78 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.14 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.13.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/1334c64a5d1de6666e0c9f984db6745083df1eb4
- https://git.kernel.org/stable/c/5d1041c76de656f9f8d5a192218039a9acf9bd00
- https://git.kernel.org/stable/c/755caf4ee1c615ee5717862e427124370f46b1f3
- https://git.kernel.org/stable/c/81846070cba17125a866e8023c01d3465b153339
- https://git.kernel.org/stable/c/8441aea46445252df5d2eed6deb6d5246fc24002
- https://git.kernel.org/stable/c/9df3a9284f39bfd51a9f72a6a165c79e2aa5066b
- https://git.kernel.org/stable/c/fd53aa40e65f518453115b6f56183b0c201db26b
- https://git.kernel.org/stable/c/fdc1e72487781dd7705bcbe30878bee7d5d1f3e8
- https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html
- https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html



