{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-21814","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-12-29T08:45:45.774Z","datePublished":"2025-02-27T20:04:14.089Z","dateUpdated":"2026-05-12T12:03:58.506Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T21:07:03.332Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nptp: Ensure info->enable callback is always set\n\nThe ioctl and sysfs handlers unconditionally call the ->enable callback.\nNot all drivers implement that callback, leading to NULL dereferences.\nExample of affected drivers: ptp_s390.c, ptp_vclock.c and ptp_mock.c.\n\nInstead use a dummy callback if no better was specified by the driver."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/ptp/ptp_clock.c"],"versions":[{"version":"d94ba80ebbea17f036cecb104398fbcd788aa742","lessThan":"fdc1e72487781dd7705bcbe30878bee7d5d1f3e8","status":"affected","versionType":"git"},{"version":"d94ba80ebbea17f036cecb104398fbcd788aa742","lessThan":"9df3a9284f39bfd51a9f72a6a165c79e2aa5066b","status":"affected","versionType":"git"},{"version":"d94ba80ebbea17f036cecb104398fbcd788aa742","lessThan":"1334c64a5d1de6666e0c9f984db6745083df1eb4","status":"affected","versionType":"git"},{"version":"d94ba80ebbea17f036cecb104398fbcd788aa742","lessThan":"5d1041c76de656f9f8d5a192218039a9acf9bd00","status":"affected","versionType":"git"},{"version":"d94ba80ebbea17f036cecb104398fbcd788aa742","lessThan":"81846070cba17125a866e8023c01d3465b153339","status":"affected","versionType":"git"},{"version":"d94ba80ebbea17f036cecb104398fbcd788aa742","lessThan":"8441aea46445252df5d2eed6deb6d5246fc24002","status":"affected","versionType":"git"},{"version":"d94ba80ebbea17f036cecb104398fbcd788aa742","lessThan":"755caf4ee1c615ee5717862e427124370f46b1f3","status":"affected","versionType":"git"},{"version":"d94ba80ebbea17f036cecb104398fbcd788aa742","lessThan":"fd53aa40e65f518453115b6f56183b0c201db26b","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/ptp/ptp_clock.c"],"versions":[{"version":"3.0","status":"affected"},{"version":"0","lessThan":"3.0","status":"unaffected","versionType":"semver"},{"version":"5.4.291","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.235","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.179","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.129","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.78","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.12.14","lessThanOrEqual":"6.12.*","status":"unaffected","versionType":"semver"},{"version":"6.13.3","lessThanOrEqual":"6.13.*","status":"unaffected","versionType":"semver"},{"version":"6.14","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0","versionEndExcluding":"5.4.291"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0","versionEndExcluding":"5.10.235"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0","versionEndExcluding":"5.15.179"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0","versionEndExcluding":"6.1.129"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0","versionEndExcluding":"6.6.78"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0","versionEndExcluding":"6.12.14"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0","versionEndExcluding":"6.13.3"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0","versionEndExcluding":"6.14"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/fdc1e72487781dd7705bcbe30878bee7d5d1f3e8"},{"url":"https://git.kernel.org/stable/c/9df3a9284f39bfd51a9f72a6a165c79e2aa5066b"},{"url":"https://git.kernel.org/stable/c/1334c64a5d1de6666e0c9f984db6745083df1eb4"},{"url":"https://git.kernel.org/stable/c/5d1041c76de656f9f8d5a192218039a9acf9bd00"},{"url":"https://git.kernel.org/stable/c/81846070cba17125a866e8023c01d3465b153339"},{"url":"https://git.kernel.org/stable/c/8441aea46445252df5d2eed6deb6d5246fc24002"},{"url":"https://git.kernel.org/stable/c/755caf4ee1c615ee5717862e427124370f46b1f3"},{"url":"https://git.kernel.org/stable/c/fd53aa40e65f518453115b6f56183b0c201db26b"}],"title":"ptp: Ensure info->enable callback is always set","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"title":"CVE Program Container","references":[{"url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"},{"url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T20:59:50.380Z"}},{"x_adpType":"supplier","providerMetadata":{"orgId":"0b142b55-0307-4c5a-b3c9-f314f3fb7c5e","shortName":"siemens-SADP","dateUpdated":"2026-05-12T12:03:58.506Z"},"affected":[{"vendor":"Siemens","product":"SIMATIC S7-1500 TM MFP - GNU/Linux subsystem","versions":[{"status":"affected","version":"0","lessThan":"*","versionType":"custom"}],"defaultStatus":"unknown"}],"references":[{"url":"https://cert-portal.siemens.com/productcert/html/ssa-265688.html"}]}]}}