In the Linux kernel, the following vulnerability has been resolved:
net: hns3: make sure ptp clock is unregister and freed if hclge_ptp_get_cycle returns an error
During the initialization of ptp, hclge_ptp_get_cycle might return an error
and returned directly without unregister clock and free it. To avoid that,
call hclge_ptp_destroy_clock to unregist and free clock if
hclge_ptp_get_cycle failed.
References
Configurations
Configuration 1 (hide)
|
History
31 Oct 2025, 18:09
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:linux:linux_kernel:5.14:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.14:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.14:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.14:-:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.14:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.14:rc7:*:*:*:*:*:* |
|
| References | () https://git.kernel.org/stable/c/21dba813d9821687a7f9aff576798ba21a859a32 - Patch | |
| References | () https://git.kernel.org/stable/c/2c04e507f3a5c5dc6e2b9ab37d8cdedee1ef1a37 - Patch | |
| References | () https://git.kernel.org/stable/c/33244e98aa9503585e585335fe2ceb4492630949 - Patch | |
| References | () https://git.kernel.org/stable/c/9cfc43c0e6e6a31122b4008d763a2960c206aa2d - Patch | |
| References | () https://git.kernel.org/stable/c/b7365eab39831487a84e63a9638209b68dc54008 - Patch | |
| References | () https://git.kernel.org/stable/c/b7d8d4529984e2d4a72a6d552fb886233e8e83cb - Patch | |
| Summary |
|
|
| CWE | CWE-459 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| First Time |
Linux linux Kernel
Linux |
01 Apr 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-04-01 16:15
Updated : 2025-10-31 18:09
NVD link : CVE-2025-21924
Mitre link : CVE-2025-21924
CVE.ORG link : CVE-2025-21924
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-459
Incomplete Cleanup
