Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-39995— media: i2c: tc358743: Fix use-after-free bugs caused by orphan timer in probe

EPSS 0.10% · P28

Affected Version Matrix 20

VendorProductVersion RangeStatus
LinuxLinuxd32d98642de66048f9534a05f3641558e811bbc9< 9205fb6e617a1c596d9a9ad2a160ee696e09d520affected
d32d98642de66048f9534a05f3641558e811bbc9< 70913586c717dd25cfbade7a418e92cc9c99398aaffected
d32d98642de66048f9534a05f3641558e811bbc9< 663faf1179db9663a3793c75e9bc869358bad910affected
d32d98642de66048f9534a05f3641558e811bbc9< 3d17701c156579969470e58b3a906511f8bc018daffected
d32d98642de66048f9534a05f3641558e811bbc9< 228d06c4cbfc750f1216a3fd91b4693b0766d2f6affected
d32d98642de66048f9534a05f3641558e811bbc9< f92181c0e13cad9671d07b15be695a97fc2534a3affected
d32d98642de66048f9534a05f3641558e811bbc9< f3f3f00bcabbd2ce0a77a2ac7a6797b8646bfd8baffected
d32d98642de66048f9534a05f3641558e811bbc9< 2610617effb4454d2f1c434c011ccb5cc7140711affected
… +12 more rows
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-39995

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
media: i2c: tc358743: Fix use-after-free bugs caused by orphan timer in probe
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: media: i2c: tc358743: Fix use-after-free bugs caused by orphan timer in probe The state->timer is a cyclic timer that schedules work_i2c_poll and delayed_work_enable_hotplug, while rearming itself. Using timer_delete() fails to guarantee the timer isn't still running when destroyed, similarly cancel_delayed_work() cannot ensure delayed_work_enable_hotplug has terminated if already executing. During probe failure after timer initialization, these may continue running as orphans and reference the already-freed tc358743_state object through tc358743_irq_poll_timer. The following is the trace captured by KASAN. BUG: KASAN: slab-use-after-free in __run_timer_base.part.0+0x7d7/0x8c0 Write of size 8 at addr ffff88800ded83c8 by task swapper/1/0 ... Call Trace: <IRQ> dump_stack_lvl+0x55/0x70 print_report+0xcf/0x610 ? __pfx_sched_balance_find_src_group+0x10/0x10 ? __run_timer_base.part.0+0x7d7/0x8c0 kasan_report+0xb8/0xf0 ? __run_timer_base.part.0+0x7d7/0x8c0 __run_timer_base.part.0+0x7d7/0x8c0 ? rcu_sched_clock_irq+0xb06/0x27d0 ? __pfx___run_timer_base.part.0+0x10/0x10 ? try_to_wake_up+0xb15/0x1960 ? tmigr_update_events+0x280/0x740 ? _raw_spin_lock_irq+0x80/0xe0 ? __pfx__raw_spin_lock_irq+0x10/0x10 tmigr_handle_remote_up+0x603/0x7e0 ? __pfx_tmigr_handle_remote_up+0x10/0x10 ? sched_balance_trigger+0x98/0x9f0 ? sched_tick+0x221/0x5a0 ? _raw_spin_lock_irq+0x80/0xe0 ? __pfx__raw_spin_lock_irq+0x10/0x10 ? tick_nohz_handler+0x339/0x440 ? __pfx_tmigr_handle_remote_up+0x10/0x10 __walk_groups.isra.0+0x42/0x150 tmigr_handle_remote+0x1f4/0x2e0 ? __pfx_tmigr_handle_remote+0x10/0x10 ? ktime_get+0x60/0x140 ? lapic_next_event+0x11/0x20 ? clockevents_program_event+0x1d4/0x2a0 ? hrtimer_interrupt+0x322/0x780 handle_softirqs+0x16a/0x550 irq_exit_rcu+0xaf/0xe0 sysvec_apic_timer_interrupt+0x70/0x80 </IRQ> ... Allocated by task 141: kasan_save_stack+0x24/0x50 kasan_save_track+0x14/0x30 __kasan_kmalloc+0x7f/0x90 __kmalloc_node_track_caller_noprof+0x198/0x430 devm_kmalloc+0x7b/0x1e0 tc358743_probe+0xb7/0x610 i2c_device_probe+0x51d/0x880 really_probe+0x1ca/0x5c0 __driver_probe_device+0x248/0x310 driver_probe_device+0x44/0x120 __device_attach_driver+0x174/0x220 bus_for_each_drv+0x100/0x190 __device_attach+0x206/0x370 bus_probe_device+0x123/0x170 device_add+0xd25/0x1470 i2c_new_client_device+0x7a0/0xcd0 do_one_initcall+0x89/0x300 do_init_module+0x29d/0x7f0 load_module+0x4f48/0x69e0 init_module_from_file+0xe4/0x150 idempotent_init_module+0x320/0x670 __x64_sys_finit_module+0xbd/0x120 do_syscall_64+0xac/0x280 entry_SYSCALL_64_after_hwframe+0x77/0x7f Freed by task 141: kasan_save_stack+0x24/0x50 kasan_save_track+0x14/0x30 kasan_save_free_info+0x3a/0x60 __kasan_slab_free+0x3f/0x50 kfree+0x137/0x370 release_nodes+0xa4/0x100 devres_release_group+0x1b2/0x380 i2c_device_probe+0x694/0x880 really_probe+0x1ca/0x5c0 __driver_probe_device+0x248/0x310 driver_probe_device+0x44/0x120 __device_attach_driver+0x174/0x220 bus_for_each_drv+0x100/0x190 __device_attach+0x206/0x370 bus_probe_device+0x123/0x170 device_add+0xd25/0x1470 i2c_new_client_device+0x7a0/0xcd0 do_one_initcall+0x89/0x300 do_init_module+0x29d/0x7f0 load_module+0x4f48/0x69e0 init_module_from_file+0xe4/0x150 idempotent_init_module+0x320/0x670 __x64_sys_finit_module+0xbd/0x120 do_syscall_64+0xac/0x280 entry_SYSCALL_64_after_hwframe+0x77/0x7f ... Replace timer_delete() with timer_delete_sync() and cancel_delayed_work() with cancel_delayed_work_sync() to ensure proper termination of timer and work items before resource cleanup. This bug was initially identified through static analysis. For reproduction and testing, I created a functional emulation of the tc358743 device via a kernel module and introduced faults through the debugfs interface.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于tc358743_state对象中存在释放后重用问题,可能导致内存损坏。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux d32d98642de66048f9534a05f3641558e811bbc9 ~ 9205fb6e617a1c596d9a9ad2a160ee696e09d520 -
LinuxLinux 4.3 -

II. Public POCs for CVE-2025-39995

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-39995

登录查看更多情报信息。

Same Patch Batch · Linux · 2025-10-15 · 34 CVEs total

CVE-2025-39973i40e: add validation for ring_len param
CVE-2025-39981Bluetooth: MGMT: Fix possible UAFs
CVE-2025-39979net/mlx5: fs, fix UAF in flow counter release
CVE-2025-39980nexthop: Forbid FDB status change while nexthop is in a group
CVE-2025-39978octeontx2-pf: Fix potential use after free in otx2_tc_add_flow()
CVE-2025-39977futex: Prevent use-after-free during requeue-PI
CVE-2025-39976futex: Use correct exit on failure from futex_hash_allocate_default()
CVE-2025-39975smb: client: fix wrong index reference in smb2_compound_op()
CVE-2025-39974tracing/osnoise: Fix slab-out-of-bounds in _parse_integer_limit()
CVE-2025-39982Bluetooth: hci_event: Fix UAF in hci_acl_create_conn_sync
CVE-2025-39972i40e: fix idx validation in i40e_validate_queue_map
CVE-2025-39970i40e: fix input validation logic for action_meta
CVE-2025-39971i40e: fix idx validation in config queues msg
CVE-2025-39969i40e: fix validation of VF state in get resources
CVE-2025-39968i40e: add max boundary check for VF filters
CVE-2025-39967fbcon: fix integer overflow in fbcon_do_set_font
CVE-2025-39966iommufd: Fix race during abort for file descriptors
CVE-2025-40000wifi: rtw89: fix use-after-free in rtw89_core_tx_kick_off_and_wait()
CVE-2025-39984net: tun: Update napi->skb after XDP process
CVE-2025-39983Bluetooth: hci_event: Fix UAF in hci_conn_tx_dequeue

Showing top 20 of 34 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2025-39995

No comments yet


Leave a comment