CVE-2025-39995
BaseFortify
Publication date: 2025-10-15
Last updated on: 2025-10-29
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a use-after-free bug in the Linux kernel's media i2c driver for the tc358743 device. It occurs because a cyclic timer and delayed work items continue running after the associated tc358743_state object has been freed during probe failure. The existing functions timer_delete() and cancel_delayed_work() do not guarantee that the timer or work items have fully stopped before the object is freed, leading to references to freed memory and potential kernel crashes or undefined behavior.
How can this vulnerability impact me? :
This vulnerability can cause kernel crashes or instability due to use-after-free memory access. If exploited or triggered, it may lead to denial of service by crashing the system or causing unpredictable kernel behavior, potentially affecting system reliability and availability.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring for use-after-free bugs related to the tc358743 driver in the Linux kernel. Specifically, kernel logs showing KASAN (Kernel Address Sanitizer) reports with messages like 'BUG: KASAN: slab-use-after-free in __run_timer_base.part.0' and call traces involving tc358743_irq_poll_timer indicate the presence of this issue. To detect it, you can check the kernel log using commands such as 'dmesg | grep -i kasan' or 'journalctl -k | grep -i kasan' to find relevant error messages.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where this vulnerability is fixed. The fix replaces timer_delete() with timer_delete_sync() and cancel_delayed_work() with cancel_delayed_work_sync() in the tc358743 driver to ensure proper termination of timers and work items before resource cleanup, preventing use-after-free conditions. Until an update is applied, avoid using the affected tc358743 device or module to reduce risk.