VYPR
Unrated severityNVD Advisory· Published Dec 16, 2025· Updated Apr 15, 2026

CVE-2025-68215

CVE-2025-68215

Description

In the Linux kernel, the following vulnerability has been resolved:

ice: fix PTP cleanup on driver removal in error path

Improve the cleanup on releasing PTP resources in error path. The error case might happen either at the driver probe and PTP feature initialization or on PTP restart (errors in reset handling, NVM update etc). In both cases, calls to PF PTP cleanup (ice_ptp_cleanup_pf function) and 'ps_lock' mutex deinitialization were missed. Additionally, ptp clock was not unregistered in the latter case.

Keep PTP state as 'uninitialized' on init to distinguish between error scenarios and to avoid resource release duplication at driver removal.

The consequence of missing ice_ptp_cleanup_pf call is the following call trace dumped when ice_adapter object is freed (port list is not empty, as it is required at this stage):

[ T93022] ------------[ cut here ]------------ [ T93022] WARNING: CPU: 10 PID: 93022 at ice/ice_adapter.c:67 ice_adapter_put+0xef/0x100 [ice] ... [ T93022] RIP: 0010:ice_adapter_put+0xef/0x100 [ice] ... [ T93022] Call Trace: [ T93022] [ T93022] ? ice_adapter_put+0xef/0x100 [ice 33d2647ad4f6d866d41eefff1806df37c68aef0c] [ T93022] ? __warn.cold+0xb0/0x10e [ T93022] ? ice_adapter_put+0xef/0x100 [ice 33d2647ad4f6d866d41eefff1806df37c68aef0c] [ T93022] ? report_bug+0xd8/0x150 [ T93022] ? handle_bug+0xe9/0x110 [ T93022] ? exc_invalid_op+0x17/0x70 [ T93022] ? asm_exc_invalid_op+0x1a/0x20 [ T93022] ? ice_adapter_put+0xef/0x100 [ice 33d2647ad4f6d866d41eefff1806df37c68aef0c] [ T93022] pci_device_remove+0x42/0xb0 [ T93022] device_release_driver_internal+0x19f/0x200 [ T93022] driver_detach+0x48/0x90 [ T93022] bus_remove_driver+0x70/0xf0 [ T93022] pci_unregister_driver+0x42/0xb0 [ T93022] ice_module_exit+0x10/0xdb0 [ice 33d2647ad4f6d866d41eefff1806df37c68aef0c] ... [ T93022] ---[ end trace 0000000000000000 ]--- [ T93022] ice: module unloaded

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel's ice driver, missing PTP cleanup calls during driver removal in error paths cause a kernel warning and potential resource leak, fixed by commit 765236f2c4fb.

Vulnerability

Description

CVE-2025-68215 is a bug in the Linux kernel's ice driver (Intel Ethernet Connection) related to improper cleanup of Precision Time Protocol (PTP) resources when the driver is removed in an error path. The error scenario can occur during driver probe and PTP feature initialization, or during PTP restart triggered by reset handling or NVM update failures. In both cases, the functions ice_ptp_cleanup_pf and ps_lock mutex deinitialization were missed, and in the latter case the PTP clock was not unregistered. This leads to a kernel warning trace when the ice_adapter object is freed, because the port list is not empty as required at that stage [1].

Exploitation and

Attack Surface

The vulnerability is triggered during driver removal, which typically requires root privileges or physical access to the system. An attacker with local access could potentially cause the driver to enter an error path (e.g., by triggering a reset or NVM update failure) and then remove the driver, leading to the kernel warning. The bug does not require authentication beyond local system access, and the attack surface is limited to systems using the ice driver with PTP enabled.

Impact

The primary impact is a kernel warning that may indicate a resource leak or inconsistent state. While the description does not confirm a full system crash or privilege escalation, such warnings can be leveraged in denial-of-service scenarios or as a precursor to more severe exploits. The missing cleanup could also leave the system in an unstable state, potentially affecting network functionality.

Mitigation

The fix is included in Linux kernel stable commit 765236f2c4fb, which ensures proper cleanup by keeping the PTP state as 'uninitialized' on init to distinguish error scenarios and avoid resource release duplication. Users should update to a kernel version containing this commit to prevent the warning and potential resource leaks.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2
  • Linux/Kernelinferred2 versions
    (expand)+ 1 more
    • (no CPE)
    • (no CPE)

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.