{"id":"CVE-2025-21814","summary":"ptp: Ensure info-\u003eenable callback is always set","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nptp: Ensure info-\u003eenable callback is always set\n\nThe ioctl and sysfs handlers unconditionally call the -\u003eenable callback.\nNot all drivers implement that callback, leading to NULL dereferences.\nExample of affected drivers: ptp_s390.c, ptp_vclock.c and ptp_mock.c.\n\nInstead use a dummy callback if no better was specified by the driver.","modified":"2026-05-18T05:58:04.234676782Z","published":"2025-02-27T20:04:14.089Z","related":["SUSE-SU-2025:01919-1","SUSE-SU-2025:01951-1","SUSE-SU-2025:01964-1","SUSE-SU-2025:01965-1","SUSE-SU-2025:01967-1","SUSE-SU-2025:01972-1","SUSE-SU-2025:01983-1","SUSE-SU-2025:02000-1","SUSE-SU-2025:20408-1","SUSE-SU-2025:20413-1","SUSE-SU-2025:20419-1","SUSE-SU-2025:20421-1","USN-7521-2"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21814.json"},"references":[{"type":"WEB","url":"https://cert-portal.siemens.com/productcert/html/ssa-265688.html"},{"type":"WEB","url":"https://git.kernel.org/stable/c/1334c64a5d1de6666e0c9f984db6745083df1eb4"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5d1041c76de656f9f8d5a192218039a9acf9bd00"},{"type":"WEB","url":"https://git.kernel.org/stable/c/755caf4ee1c615ee5717862e427124370f46b1f3"},{"type":"WEB","url":"https://git.kernel.org/stable/c/81846070cba17125a866e8023c01d3465b153339"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8441aea46445252df5d2eed6deb6d5246fc24002"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9df3a9284f39bfd51a9f72a6a165c79e2aa5066b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/fd53aa40e65f518453115b6f56183b0c201db26b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/fdc1e72487781dd7705bcbe30878bee7d5d1f3e8"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21814.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21814"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"d94ba80ebbea17f036cecb104398fbcd788aa742"},{"fixed":"fdc1e72487781dd7705bcbe30878bee7d5d1f3e8"},{"fixed":"9df3a9284f39bfd51a9f72a6a165c79e2aa5066b"},{"fixed":"1334c64a5d1de6666e0c9f984db6745083df1eb4"},{"fixed":"5d1041c76de656f9f8d5a192218039a9acf9bd00"},{"fixed":"81846070cba17125a866e8023c01d3465b153339"},{"fixed":"8441aea46445252df5d2eed6deb6d5246fc24002"},{"fixed":"755caf4ee1c615ee5717862e427124370f46b1f3"},{"fixed":"fd53aa40e65f518453115b6f56183b0c201db26b"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-21814.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"3.0.0"},{"fixed":"5.4.291"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.235"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.179"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.129"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.78"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.12.14"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.13.0"},{"fixed":"6.13.3"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-21814.json"}}],"schema_version":"1.7.5"}