In the Linux kernel, the following vulnerability has been resolved:
net: hns3: make sure ptp clock is unregister and freed if hclgeptpget_cycle returns an error
During the initialization of ptp, hclgeptpgetcycle might return an error and returned directly without unregister clock and free it. To avoid that, call hclgeptpdestroyclock to unregist and free clock if hclgeptpget_cycle failed.
[
{
"signature_type": "Line",
"deprecated": false,
"target": {
"file": "drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_ptp.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@33244e98aa9503585e585335fe2ceb4492630949",
"digest": {
"line_hashes": [
"154767860974866402456981103230503251032",
"336384735002648907918483643726358963251",
"94314668410603646159617005100429266503",
"41842654975926945945797345972674898156"
],
"threshold": 0.9
},
"id": "CVE-2025-21924-031be438"
},
{
"signature_type": "Function",
"deprecated": false,
"target": {
"file": "drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_ptp.c",
"function": "hclge_ptp_init"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b7d8d4529984e2d4a72a6d552fb886233e8e83cb",
"digest": {
"length": 1084.0,
"function_hash": "232574654375326032352005274021956160074"
},
"id": "CVE-2025-21924-211498a7"
},
{
"signature_type": "Line",
"deprecated": false,
"target": {
"file": "drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_ptp.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b7365eab39831487a84e63a9638209b68dc54008",
"digest": {
"line_hashes": [
"154767860974866402456981103230503251032",
"336384735002648907918483643726358963251",
"94314668410603646159617005100429266503",
"41842654975926945945797345972674898156"
],
"threshold": 0.9
},
"id": "CVE-2025-21924-455b4cb9"
},
{
"signature_type": "Function",
"deprecated": false,
"target": {
"file": "drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_ptp.c",
"function": "hclge_ptp_init"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@33244e98aa9503585e585335fe2ceb4492630949",
"digest": {
"length": 1084.0,
"function_hash": "232574654375326032352005274021956160074"
},
"id": "CVE-2025-21924-53f562fa"
},
{
"signature_type": "Line",
"deprecated": false,
"target": {
"file": "drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_ptp.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@21dba813d9821687a7f9aff576798ba21a859a32",
"digest": {
"line_hashes": [
"154767860974866402456981103230503251032",
"336384735002648907918483643726358963251",
"94314668410603646159617005100429266503",
"41842654975926945945797345972674898156"
],
"threshold": 0.9
},
"id": "CVE-2025-21924-6e0c54f5"
},
{
"signature_type": "Function",
"deprecated": false,
"target": {
"file": "drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_ptp.c",
"function": "hclge_ptp_init"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b7365eab39831487a84e63a9638209b68dc54008",
"digest": {
"length": 1084.0,
"function_hash": "232574654375326032352005274021956160074"
},
"id": "CVE-2025-21924-8fbf1b3e"
},
{
"signature_type": "Line",
"deprecated": false,
"target": {
"file": "drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_ptp.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b7d8d4529984e2d4a72a6d552fb886233e8e83cb",
"digest": {
"line_hashes": [
"154767860974866402456981103230503251032",
"336384735002648907918483643726358963251",
"94314668410603646159617005100429266503",
"41842654975926945945797345972674898156"
],
"threshold": 0.9
},
"id": "CVE-2025-21924-a6eb2dd1"
},
{
"signature_type": "Function",
"deprecated": false,
"target": {
"file": "drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_ptp.c",
"function": "hclge_ptp_init"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@21dba813d9821687a7f9aff576798ba21a859a32",
"digest": {
"length": 1084.0,
"function_hash": "232574654375326032352005274021956160074"
},
"id": "CVE-2025-21924-e71a4437"
}
]