CVE-2025-21924

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-21924
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-21924.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-21924
Downstream
Related
Published
2025-04-01T15:40:56.841Z
Modified
2025-11-28T02:34:44.170786Z
Summary
net: hns3: make sure ptp clock is unregister and freed if hclge_ptp_get_cycle returns an error
Details

In the Linux kernel, the following vulnerability has been resolved:

net: hns3: make sure ptp clock is unregister and freed if hclgeptpget_cycle returns an error

During the initialization of ptp, hclgeptpgetcycle might return an error and returned directly without unregister clock and free it. To avoid that, call hclgeptpdestroyclock to unregist and free clock if hclgeptpget_cycle failed.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21924.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
8373cd38a8888549ace7c7617163a2e826970a92
Fixed
b7d8d4529984e2d4a72a6d552fb886233e8e83cb
Fixed
33244e98aa9503585e585335fe2ceb4492630949
Fixed
2c04e507f3a5c5dc6e2b9ab37d8cdedee1ef1a37
Fixed
9cfc43c0e6e6a31122b4008d763a2960c206aa2d
Fixed
21dba813d9821687a7f9aff576798ba21a859a32
Fixed
b7365eab39831487a84e63a9638209b68dc54008

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.14.0
Fixed
5.15.179
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.131
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.83
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.19
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.13.7