CVE-2025-39908

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
01/10/2025
Last modified:
14/01/2026

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net: dev_ioctl: take ops lock in hwtstamp lower paths<br /> <br /> ndo hwtstamp callbacks are expected to run under the per-device ops<br /> lock. Make the lower get/set paths consistent with the rest of ndo<br /> invocations.<br /> <br /> Kernel log:<br /> WARNING: CPU: 13 PID: 51364 at ./include/net/netdev_lock.h:70 __netdev_update_features+0x4bd/0xe60<br /> ...<br /> RIP: 0010:__netdev_update_features+0x4bd/0xe60<br /> ...<br /> Call Trace:<br /> <br /> netdev_update_features+0x1f/0x60<br /> mlx5_hwtstamp_set+0x181/0x290 [mlx5_core]<br /> mlx5e_hwtstamp_set+0x19/0x30 [mlx5_core]<br /> dev_set_hwtstamp_phylib+0x9f/0x220<br /> dev_set_hwtstamp_phylib+0x9f/0x220<br /> dev_set_hwtstamp+0x13d/0x240<br /> dev_ioctl+0x12f/0x4b0<br /> sock_ioctl+0x171/0x370<br /> __x64_sys_ioctl+0x3f7/0x900<br /> ? __sys_setsockopt+0x69/0xb0<br /> do_syscall_64+0x6f/0x2e0<br /> entry_SYSCALL_64_after_hwframe+0x4b/0x53<br /> ...<br /> <br /> ....<br /> ---[ end trace 0000000000000000 ]---<br /> <br /> Note that the mlx5_hwtstamp_set and mlx5e_hwtstamp_set functions shown<br /> in the trace come from an in progress patch converting the legacy ioctl<br /> to ndo_hwtstamp_get/set and are not present in mainline.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.15 (including) 6.16.8 (excluding)
cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc5:*:*:*:*:*:*