๐Ÿ” CVE Alert

CVE-2025-21814

UNKNOWN 0.0

ptp: Ensure info->enable callback is always set

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: ptp: Ensure info->enable callback is always set The ioctl and sysfs handlers unconditionally call the ->enable callback. Not all drivers implement that callback, leading to NULL dereferences. Example of affected drivers: ptp_s390.c, ptp_vclock.c and ptp_mock.c. Instead use a dummy callback if no better was specified by the driver.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Feb 27, 2025
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
d94ba80ebbea17f036cecb104398fbcd788aa742 < fdc1e72487781dd7705bcbe30878bee7d5d1f3e8 d94ba80ebbea17f036cecb104398fbcd788aa742 < 9df3a9284f39bfd51a9f72a6a165c79e2aa5066b d94ba80ebbea17f036cecb104398fbcd788aa742 < 1334c64a5d1de6666e0c9f984db6745083df1eb4 d94ba80ebbea17f036cecb104398fbcd788aa742 < 5d1041c76de656f9f8d5a192218039a9acf9bd00 d94ba80ebbea17f036cecb104398fbcd788aa742 < 81846070cba17125a866e8023c01d3465b153339 d94ba80ebbea17f036cecb104398fbcd788aa742 < 8441aea46445252df5d2eed6deb6d5246fc24002 d94ba80ebbea17f036cecb104398fbcd788aa742 < 755caf4ee1c615ee5717862e427124370f46b1f3 d94ba80ebbea17f036cecb104398fbcd788aa742 < fd53aa40e65f518453115b6f56183b0c201db26b
Linux / Linux
3.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/fdc1e72487781dd7705bcbe30878bee7d5d1f3e8 git.kernel.org: https://git.kernel.org/stable/c/9df3a9284f39bfd51a9f72a6a165c79e2aa5066b git.kernel.org: https://git.kernel.org/stable/c/1334c64a5d1de6666e0c9f984db6745083df1eb4 git.kernel.org: https://git.kernel.org/stable/c/5d1041c76de656f9f8d5a192218039a9acf9bd00 git.kernel.org: https://git.kernel.org/stable/c/81846070cba17125a866e8023c01d3465b153339 git.kernel.org: https://git.kernel.org/stable/c/8441aea46445252df5d2eed6deb6d5246fc24002 git.kernel.org: https://git.kernel.org/stable/c/755caf4ee1c615ee5717862e427124370f46b1f3 git.kernel.org: https://git.kernel.org/stable/c/fd53aa40e65f518453115b6f56183b0c201db26b lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-265688.html