CVE-2025-38305

Source
https://cve.org/CVERecord?id=CVE-2025-38305
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38305.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-38305
Downstream
Related
Published
2025-07-10T07:42:16.127Z
Modified
2026-03-12T02:17:53.342319Z
Summary
ptp: remove ptp->n_vclocks check logic in ptp_vclock_in_use()
Details

In the Linux kernel, the following vulnerability has been resolved:

ptp: remove ptp->nvclocks check logic in ptpvclockinuse()

There is no disagreement that we should check both ptp->isvirtualclock and ptp->n_vclocks to check if the ptp virtual clock is in use.

However, when we acquire ptp->nvclocksmux to read ptp->nvclocks in ptpvclockinuse(), we observe a recursive lock in the call trace starting from nvclocksstore().

============================================ WARNING: possible recursive locking detected

6.15.0-rc6 #1 Not tainted

syz.0.1540/13807 is trying to acquire lock: ffff888035a24868 (&ptp->nvclocksmux){+.+.}-{4:4}, at: ptpvclockinuse drivers/ptp/ptpprivate.h:103 [inline] ffff888035a24868 (&ptp->nvclocksmux){+.+.}-{4:4}, at: ptpclockunregister+0x21/0x250 drivers/ptp/ptp_clock.c:415

but task is already holding lock: ffff888030704868 (&ptp->nvclocksmux){+.+.}-{4:4}, at: nvclocksstore+0xf1/0x6d0 drivers/ptp/ptp_sysfs.c:215

other info that might help us debug this: Possible unsafe locking scenario:

   CPU0
   ----

lock(&ptp->nvclocksmux); lock(&ptp->nvclocksmux);

*** DEADLOCK ***

....

The best way to solve this is to remove the logic that checks ptp->nvclocks in ptpvclockinuse().

The reason why this is appropriate is that any path that uses ptp->nvclocks must unconditionally check if ptp->nvclocks is greater than 0 before unregistering vclocks, and all functions are already written this way. And in the function that uses ptp->nvclocks, we already get ptp->nvclocks_mux before unregistering vclocks.

Therefore, we need to remove the redundant check for ptp->nvclocks in ptpvclockinuse() to prevent recursive locking.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38305.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
73f37068d540eba5f93ba3a0019bf479d35ebd76
Fixed
5d217e7031a5c06d366580fc6ddbf43527b780d4
Fixed
b1b73c452331451020be3bf4b014901015ae6663
Fixed
259119595227fd20f6aa29d85abe086b6fdd9eb1
Fixed
b93e6fef4eda48e17d9c642b9abad98a066fd4a3
Fixed
ef8fc007c28a30a4c0d90bf755e0f343d99bb392
Fixed
87f7ce260a3c838b49e1dc1ceedf1006795157a2

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38305.json"