Bug 2376047 (CVE-2025-38148) - CVE-2025-38148 kernel: net: phy: mscc: Fix memory leak when using one step timestamping
Summary: CVE-2025-38148 kernel: net: phy: mscc: Fix memory leak when using one step ti...
Keywords:
Status: NEW
Alias: CVE-2025-38148
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-07-03 09:02 UTC by OSIDB Bzimport
Modified: 2025-07-03 19:16 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-07-03 09:02:16 UTC
In the Linux kernel, the following vulnerability has been resolved:

net: phy: mscc: Fix memory leak when using one step timestamping

Fix memory leak when running one-step timestamping. When running
one-step sync timestamping, the HW is configured to insert the TX time
into the frame, so there is no reason to keep the skb anymore. As in
this case the HW will never generate an interrupt to say that the frame
was timestamped, then the frame will never released.
Fix this by freeing the frame in case of one-step timestamping.

Comment 1 Avinash Hanwate 2025-07-03 19:07:32 UTC
Upstream advisory:
https://lore.kernel.org/linux-cve-announce/2025070336-CVE-2025-38148-76a4@gregkh/T


Note You need to log in before you can comment on or make changes to this bug.