{"uuid": "aee2b136-abbc-486e-aaac-9deac5f8d322", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21822", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/5785", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-21822\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nptp: vmclock: Set driver data before its usage\n\nIf vmclock_ptp_register() fails during probing, vmclock_remove() is\ncalled to clean up the ptp clock and misc device.\nIt uses dev_get_drvdata() to access the vmclock state.\nHowever the driver data is not yet set at this point.\n\nAssign the driver data earlier.\n\ud83d\udccf Published: 2025-02-27T20:06:13.422Z\n\ud83d\udccf Modified: 2025-02-27T20:06:13.422Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/6dbd8b91a065d1d8001446a28e72cd140f9acef0\n2. https://git.kernel.org/stable/c/f7d07cd4f77d77f366c8ffbb8ba8b61f614e5fce", "creation_timestamp": "2025-02-27T20:25:48.000000Z"}