
Cloud Vulnerability DB
A community-led vulnerabilities database
A use-after-free vulnerability (CVE-2025-39944) was discovered in the Linux kernel's octeontx2-pf driver, specifically in the otx2synctstamp() function. The vulnerability was disclosed on October 4, 2025, affecting the Linux kernel's PTP (Precision Time Protocol) implementation for OcteonTX2 devices (NVD).
The vulnerability stems from improper synchronization in the otx2ptpdestroy() function, which uses canceldelayedwork() without ensuring the complete termination of the synctstampwork delayed work item. This creates a race condition where otx2ptp can be deallocated while synctstampwork is still active, leading to use-after-free scenarios. The issue is particularly concerning because synctstampwork operates cyclically, increasing the likelihood of triggering the vulnerability. The bug was initially identified through static analysis and confirmed through KASAN (Kernel Address Sanitizer) reports (NVD).
When exploited, this vulnerability can lead to use-after-free conditions in the kernel's memory management, potentially resulting in system crashes, memory corruption, or privilege escalation. The cyclic nature of the synctstamp_work increases the probability of successful exploitation (NVD).
The recommended fix involves replacing canceldelayedwork() with canceldelayedworksync() in the otx2ptpdestroy() function to ensure proper synchronization and complete termination of the delayed work item before deallocating otx2ptp (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."