CVE-2025-39944
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
04/10/2025
Last modified:
27/01/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp()<br />
<br />
The original code relies on cancel_delayed_work() in otx2_ptp_destroy(),<br />
which does not ensure that the delayed work item synctstamp_work has fully<br />
completed if it was already running. This leads to use-after-free scenarios<br />
where otx2_ptp is deallocated by otx2_ptp_destroy(), while synctstamp_work<br />
remains active and attempts to dereference otx2_ptp in otx2_sync_tstamp().<br />
Furthermore, the synctstamp_work is cyclic, the likelihood of triggering<br />
the bug is nonnegligible.<br />
<br />
A typical race condition is illustrated below:<br />
<br />
CPU 0 (cleanup) | CPU 1 (delayed work callback)<br />
otx2_remove() |<br />
otx2_ptp_destroy() | otx2_sync_tstamp()<br />
cancel_delayed_work() |<br />
kfree(ptp) |<br />
| ptp = container_of(...); //UAF<br />
| ptp-> //UAF<br />
<br />
This is confirmed by a KASAN report:<br />
<br />
BUG: KASAN: slab-use-after-free in __run_timer_base.part.0+0x7d7/0x8c0<br />
Write of size 8 at addr ffff88800aa09a18 by task bash/136<br />
...<br />
Call Trace:<br />
<br />
dump_stack_lvl+0x55/0x70<br />
print_report+0xcf/0x610<br />
? __run_timer_base.part.0+0x7d7/0x8c0<br />
kasan_report+0xb8/0xf0<br />
? __run_timer_base.part.0+0x7d7/0x8c0<br />
__run_timer_base.part.0+0x7d7/0x8c0<br />
? __pfx___run_timer_base.part.0+0x10/0x10<br />
? __pfx_read_tsc+0x10/0x10<br />
? ktime_get+0x60/0x140<br />
? lapic_next_event+0x11/0x20<br />
? clockevents_program_event+0x1d4/0x2a0<br />
run_timer_softirq+0xd1/0x190<br />
handle_softirqs+0x16a/0x550<br />
irq_exit_rcu+0xaf/0xe0<br />
sysvec_apic_timer_interrupt+0x70/0x80<br />
<br />
...<br />
Allocated by task 1:<br />
kasan_save_stack+0x24/0x50<br />
kasan_save_track+0x14/0x30<br />
__kasan_kmalloc+0x7f/0x90<br />
otx2_ptp_init+0xb1/0x860<br />
otx2_probe+0x4eb/0xc30<br />
local_pci_probe+0xdc/0x190<br />
pci_device_probe+0x2fe/0x470<br />
really_probe+0x1ca/0x5c0<br />
__driver_probe_device+0x248/0x310<br />
driver_probe_device+0x44/0x120<br />
__driver_attach+0xd2/0x310<br />
bus_for_each_dev+0xed/0x170<br />
bus_add_driver+0x208/0x500<br />
driver_register+0x132/0x460<br />
do_one_initcall+0x89/0x300<br />
kernel_init_freeable+0x40d/0x720<br />
kernel_init+0x1a/0x150<br />
ret_from_fork+0x10c/0x1a0<br />
ret_from_fork_asm+0x1a/0x30<br />
<br />
Freed by task 136:<br />
kasan_save_stack+0x24/0x50<br />
kasan_save_track+0x14/0x30<br />
kasan_save_free_info+0x3a/0x60<br />
__kasan_slab_free+0x3f/0x50<br />
kfree+0x137/0x370<br />
otx2_ptp_destroy+0x38/0x80<br />
otx2_remove+0x10d/0x4c0<br />
pci_device_remove+0xa6/0x1d0<br />
device_release_driver_internal+0xf8/0x210<br />
pci_stop_bus_device+0x105/0x150<br />
pci_stop_and_remove_bus_device_locked+0x15/0x30<br />
remove_store+0xcc/0xe0<br />
kernfs_fop_write_iter+0x2c3/0x440<br />
vfs_write+0x871/0xd70<br />
ksys_write+0xee/0x1c0<br />
do_syscall_64+0xac/0x280<br />
entry_SYSCALL_64_after_hwframe+0x77/0x7f<br />
...<br />
<br />
Replace cancel_delayed_work() with cancel_delayed_work_sync() to ensure<br />
that the delayed work item is properly canceled before the otx2_ptp is<br />
deallocated.<br />
<br />
This bug was initially identified through static analysis. To reproduce<br />
and test it, I simulated the OcteonTX2 PCI device in QEMU and introduced<br />
artificial delays within the otx2_sync_tstamp() function to increase the<br />
likelihood of triggering the bug.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.1 (including) | 6.1.154 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.108 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.49 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.16.9 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.17:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.17:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.17:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.17:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.17:rc6:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/2786879aebf363806a13d41e8d5f99202ddd23d9
- https://git.kernel.org/stable/c/5ca20bb7b4bde72110c3ae78423cbfdd0157aa36
- https://git.kernel.org/stable/c/d2cfefa14ce8137b17f99683f968bebf134b6a48
- https://git.kernel.org/stable/c/f8b4687151021db61841af983f1cb7be6915d4ef
- https://git.kernel.org/stable/c/ff27e23b311fed4d25e3852e27ba693416d4c7b3



