CVE-2025-38305

Source
https://cve.org/CVERecord?id=CVE-2025-38305
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38305.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-38305
Downstream
Related
Published
2025-07-10T07:42:16.127Z
Modified
2026-05-07T04:18:15.309235Z
Summary
ptp: remove ptp->n_vclocks check logic in ptp_vclock_in_use()
Details

In the Linux kernel, the following vulnerability has been resolved:

ptp: remove ptp->nvclocks check logic in ptpvclockinuse()

There is no disagreement that we should check both ptp->isvirtualclock and ptp->n_vclocks to check if the ptp virtual clock is in use.

However, when we acquire ptp->nvclocksmux to read ptp->nvclocks in ptpvclockinuse(), we observe a recursive lock in the call trace starting from nvclocksstore().

============================================ WARNING: possible recursive locking detected

6.15.0-rc6 #1 Not tainted

syz.0.1540/13807 is trying to acquire lock: ffff888035a24868 (&ptp->nvclocksmux){+.+.}-{4:4}, at: ptpvclockinuse drivers/ptp/ptpprivate.h:103 [inline] ffff888035a24868 (&ptp->nvclocksmux){+.+.}-{4:4}, at: ptpclockunregister+0x21/0x250 drivers/ptp/ptp_clock.c:415

but task is already holding lock: ffff888030704868 (&ptp->nvclocksmux){+.+.}-{4:4}, at: nvclocksstore+0xf1/0x6d0 drivers/ptp/ptp_sysfs.c:215

other info that might help us debug this: Possible unsafe locking scenario:

   CPU0
   ----

lock(&ptp->nvclocksmux); lock(&ptp->nvclocksmux);

*** DEADLOCK ***

....

The best way to solve this is to remove the logic that checks ptp->nvclocks in ptpvclockinuse().

The reason why this is appropriate is that any path that uses ptp->nvclocks must unconditionally check if ptp->nvclocks is greater than 0 before unregistering vclocks, and all functions are already written this way. And in the function that uses ptp->nvclocks, we already get ptp->nvclocks_mux before unregistering vclocks.

Therefore, we need to remove the redundant check for ptp->nvclocks in ptpvclockinuse() to prevent recursive locking.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38305.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
73f37068d540eba5f93ba3a0019bf479d35ebd76
Fixed
5d217e7031a5c06d366580fc6ddbf43527b780d4
Fixed
b1b73c452331451020be3bf4b014901015ae6663
Fixed
259119595227fd20f6aa29d85abe086b6fdd9eb1
Fixed
b93e6fef4eda48e17d9c642b9abad98a066fd4a3
Fixed
ef8fc007c28a30a4c0d90bf755e0f343d99bb392
Fixed
87f7ce260a3c838b49e1dc1ceedf1006795157a2

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38305.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.14.0
Fixed
5.15.186
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.142
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.94
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.34
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.15.3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38305.json"