CVE-2025-38126

Source
https://cve.org/CVERecord?id=CVE-2025-38126
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38126.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-38126
Downstream
Related
Published
2025-07-03T08:35:31.812Z
Modified
2026-03-11T07:52:10.474656Z
Summary
net: stmmac: make sure that ptp_rate is not 0 before configuring timestamping
Details

In the Linux kernel, the following vulnerability has been resolved:

net: stmmac: make sure that ptp_rate is not 0 before configuring timestamping

The stmmac platform drivers that do not open-code the clkptprate value after having retrieved the default one from the device-tree can end up with 0 in clkptprate (as clkgetrate can return 0). It will eventually propagate up to PTP initialization when bringing up the interface, leading to a divide by 0:

Division by zero in kernel. CPU: 1 UID: 0 PID: 1 Comm: swapper/0 Not tainted 6.12.30-00001-g48313bd5768a #22 Hardware name: STM32 (Device Tree Support) Call trace: unwindbacktrace from showstack+0x18/0x1c showstack from dumpstacklvl+0x6c/0x8c dumpstacklvl from Ldiv064+0x8/0x18 Ldiv064 from stmmacinittstampcounter+0x190/0x1a4 stmmacinittstampcounter from stmmachwsetup+0xc1c/0x111c stmmachw_setup from __stmmac_open+0x18c/0x434 __stmmacopen from stmmacopen+0x3c/0xbc stmmac_open from __dev_open+0xf4/0x1ac __dev_open from __devchangeflags+0x1cc/0x224 __devchangeflags from devchangeflags+0x24/0x60 devchangeflags from ipautoconfig+0x2e8/0x11a0 ipautoconfig from dooneinitcall+0x84/0x33c dooneinitcall from kernelinitfreeable+0x1b8/0x214 kernelinitfreeable from kernelinit+0x24/0x140 kernelinit from retfromfork+0x14/0x28 Exception stack(0xe0815fb0 to 0xe0815ff8)

Prevent this division by 0 by adding an explicit check and error log about the actual issue. While at it, remove the same check from stmmacptpregister, which then becomes duplicate

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38126.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
19d857c9038e5c07db8f8cc02b5ad0cd0098714f
Fixed
32af9c289234990752281c805500dfe03c5b2b8f
Fixed
b263088ee8ab14563817a8be3519af8e25225793
Fixed
bb033c6781ce1b0264c3993b767b4aa9021959c2
Fixed
379cd990dfe752b38fcf46034698a9a150626c7a
Fixed
030ce919e114a111e83b7976ecb3597cefd33f26

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38126.json"