Linux Kernel Vulnerability in PTP Callback Handling
CVE-2025-21814
Summary
A vulnerability exists in the Linux kernel related to the Precision Time Protocol (PTP) drivers, where the ioctl and sysfs handlers unconditionally invoke the ->enable callback. This can lead to NULL dereferences in scenarios where some drivers, such as ptp_s390.c, ptp_vclock.c, and ptp_mock.c, do not implement this callback properly. The solution involves implementing a dummy callback in the absence of a specified driver callback, ensuring more robust handling of driver operations.
Affected Version(s)
Linux d94ba80ebbea17f036cecb104398fbcd788aa742 < 5d1041c76de656f9f8d5a192218039a9acf9bd00
Linux d94ba80ebbea17f036cecb104398fbcd788aa742 < 81846070cba17125a866e8023c01d3465b153339
Linux d94ba80ebbea17f036cecb104398fbcd788aa742 < 8441aea46445252df5d2eed6deb6d5246fc24002
References
Timeline
Vulnerability published
Vulnerability Reserved