CVE-2025-38054

MEDIUM

Linux Kernel - NULL Pointer Dereference

Title source: llm
STIX 2.1

Description

In the Linux kernel, the following vulnerability has been resolved: ptp: ocp: Limit signal/freq counts in summary output functions The debugfs summary output could access uninitialized elements in the freq_in[] and signal_out[] arrays, causing NULL pointer dereferences and triggering a kernel Oops (page_fault_oops). This patch adds u8 fields (nr_freq_in, nr_signal_out) to track the number of initialized elements, with a maximum of 4 per array. The summary output functions are updated to respect these limits, preventing out-of-bounds access and ensuring safe array handling. Widen the label variables because the change confuses GCC about max length of the strings.

Scores

CVSS v3 5.5
EPSS 0.0005
EPSS Percentile 15.1%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Details

CWE
CWE-908
Status published
Products (4)
linux/Kernel 6.13.0 - 6.14.9linux
linux/Kernel 6.9.0 - 6.12.31linux
linux/linux_kernel 6.15 rc1 (7 CPE variants)
linux/linux_kernel 6.9 - 6.12.31
Published Jun 18, 2025
Tracked Since Feb 18, 2026