CVE-2025-21814
Published: March 1, 2025Last modified: March 1, 2025
Description
In the Linux kernel, the following vulnerability has been resolved: ptp: Ensure info->enable callback is always set The ioctl and sysfs handlers unconditionally call the ->enable callback. Not all drivers implement that callback, leading to NULL dereferences. Example of affected drivers: ptp_s390.c, ptp_vclock.c and ptp_mock.c. Instead use a dummy callback if no better was specified by the driver.
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.5 |
Attack Vector | LOCAL |
Attack complexity | LOW |
Privileges required | LOW |
User interaction | NONE |
Scope | UNCHANGED |
Confidentiality | NONE |
Integrity impact | NONE |
Availability impact | HIGH |
Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
Status
Product | Release | Package | Status |
---|---|---|---|
Alpaquita Linux | 23 LTS | linux-lts | Fixed (6.1.130-r0) |
Stream | linux-lts | Fixed (6.6.78-r0) |
References
- https://git.kernel.org/stable/c/1334c64a5d1de6666e0c9f984db6745083df1eb4
- https://git.kernel.org/stable/c/5d1041c76de656f9f8d5a192218039a9acf9bd00
- https://git.kernel.org/stable/c/755caf4ee1c615ee5717862e427124370f46b1f3
- https://git.kernel.org/stable/c/81846070cba17125a866e8023c01d3465b153339
- https://git.kernel.org/stable/c/8441aea46445252df5d2eed6deb6d5246fc24002
- https://git.kernel.org/stable/c/9df3a9284f39bfd51a9f72a6a165c79e2aa5066b
- https://git.kernel.org/stable/c/fd53aa40e65f518453115b6f56183b0c201db26b
- https://git.kernel.org/stable/c/fdc1e72487781dd7705bcbe30878bee7d5d1f3e8