In the Linux kernel, the following vulnerability has been resolved:
net: hns3: make sure ptp clock is unregister and freed if hclge_ptp_get_cycle returns an error
During the initialization of ptp, hclge_ptp_get_cycle might return an error
and returned directly without unregister clock and free it. To avoid that,
call hclge_ptp_destroy_clock to unregist and free clock if
hclge_ptp_get_cycle failed.
Metrics
Affected Vendors & Products
References
History
Wed, 02 Apr 2025 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-459 | |
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Tue, 01 Apr 2025 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: net: hns3: make sure ptp clock is unregister and freed if hclge_ptp_get_cycle returns an error During the initialization of ptp, hclge_ptp_get_cycle might return an error and returned directly without unregister clock and free it. To avoid that, call hclge_ptp_destroy_clock to unregist and free clock if hclge_ptp_get_cycle failed. | |
Title | net: hns3: make sure ptp clock is unregister and freed if hclge_ptp_get_cycle returns an error | |
References |
|
|

Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2025-04-01T15:40:56.841Z
Reserved: 2024-12-29T08:45:45.788Z
Link: CVE-2025-21924

No data.

Status : Awaiting Analysis
Published: 2025-04-01T16:15:23.110
Modified: 2025-04-01T20:26:01.990
Link: CVE-2025-21924
