CVE-2025-21814
ptp: Ensure info->enable callback is always set
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: ptp: Ensure info->enable callback is always set The ioctl and sysfs handlers unconditionally call the ->enable callback. Not all drivers implement that callback, leading to NULL dereferences. Example of affected drivers: ptp_s390.c, ptp_vclock.c and ptp_mock.c. Instead use a dummy callback if no better was specified by the driver.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Feb 27, 2025 |
| Last Updated | May 12, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
d94ba80ebbea17f036cecb104398fbcd788aa742 < fdc1e72487781dd7705bcbe30878bee7d5d1f3e8 d94ba80ebbea17f036cecb104398fbcd788aa742 < 9df3a9284f39bfd51a9f72a6a165c79e2aa5066b d94ba80ebbea17f036cecb104398fbcd788aa742 < 1334c64a5d1de6666e0c9f984db6745083df1eb4 d94ba80ebbea17f036cecb104398fbcd788aa742 < 5d1041c76de656f9f8d5a192218039a9acf9bd00 d94ba80ebbea17f036cecb104398fbcd788aa742 < 81846070cba17125a866e8023c01d3465b153339 d94ba80ebbea17f036cecb104398fbcd788aa742 < 8441aea46445252df5d2eed6deb6d5246fc24002 d94ba80ebbea17f036cecb104398fbcd788aa742 < 755caf4ee1c615ee5717862e427124370f46b1f3 d94ba80ebbea17f036cecb104398fbcd788aa742 < fd53aa40e65f518453115b6f56183b0c201db26b
Linux / Linux
3.0
References
git.kernel.org: https://git.kernel.org/stable/c/fdc1e72487781dd7705bcbe30878bee7d5d1f3e8 git.kernel.org: https://git.kernel.org/stable/c/9df3a9284f39bfd51a9f72a6a165c79e2aa5066b git.kernel.org: https://git.kernel.org/stable/c/1334c64a5d1de6666e0c9f984db6745083df1eb4 git.kernel.org: https://git.kernel.org/stable/c/5d1041c76de656f9f8d5a192218039a9acf9bd00 git.kernel.org: https://git.kernel.org/stable/c/81846070cba17125a866e8023c01d3465b153339 git.kernel.org: https://git.kernel.org/stable/c/8441aea46445252df5d2eed6deb6d5246fc24002 git.kernel.org: https://git.kernel.org/stable/c/755caf4ee1c615ee5717862e427124370f46b1f3 git.kernel.org: https://git.kernel.org/stable/c/fd53aa40e65f518453115b6f56183b0c201db26b lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-265688.html