CVE-2025-39859Use After Free in Linux

CWE-416Use After Free6 documents6 sources
Severity
7.8HIGHNVD
EPSS
0.0%
top 94.46%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 19
Latest updateSep 22

Description

In the Linux kernel, the following vulnerability has been resolved: ptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog The ptp_ocp_detach() only shuts down the watchdog timer if it is pending. However, if the timer handler is already running, the timer_delete_sync() is not called. This leads to race conditions where the devlink that contains the ptp_ocp is deallocated while the timer handler is still accessing it, resulting in use-after-free bugs. The following details one of the ra

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Patches

🔴Vulnerability Details

2
GHSA
GHSA-fq5x-p5vr-m6pg: In the Linux kernel, the following vulnerability has been resolved: ptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog The ptp_ocp_detach2025-09-22
OSV
CVE-2025-39859: In the Linux kernel, the following vulnerability has been resolved: ptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog The ptp_ocp_detach()2025-09-19

📋Vendor Advisories

3
Red Hat
kernel: ptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog2025-09-19
Microsoft
ptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog2025-09-09
Debian
CVE-2025-39859: linux - In the Linux kernel, the following vulnerability has been resolved: ptp: ocp: f...2025