CVE-2025-38054

Source
https://cve.org/CVERecord?id=CVE-2025-38054
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38054.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-38054
Downstream
Published
2025-06-18T09:33:34.686Z
Modified
2026-03-20T12:42:38.899220Z
Summary
ptp: ocp: Limit signal/freq counts in summary output functions
Details

In the Linux kernel, the following vulnerability has been resolved:

ptp: ocp: Limit signal/freq counts in summary output functions

The debugfs summary output could access uninitialized elements in the freqin[] and signalout[] arrays, causing NULL pointer dereferences and triggering a kernel Oops (pagefaultoops). This patch adds u8 fields (nrfreqin, nrsignalout) to track the number of initialized elements, with a maximum of 4 per array. The summary output functions are updated to respect these limits, preventing out-of-bounds access and ensuring safe array handling.

Widen the label variables because the change confuses GCC about max length of the strings.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38054.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
ef61f5528fca6c3bbb2f8bc002fd1949c9d1f9b9
Fixed
0b7d3e782027ac3b6fec56159e8e348042000aef
Fixed
fcad74f894ac89790084cc2e1ec61b08220941d1
Fixed
c9e455581e2ba87ee38c126e8dc49a424b9df0cf

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38054.json"