In the Linux kernel, the following vulnerability has been resolved:
net: phy: mscc: Fix memory leak when using one step timestamping
Fix memory leak when running one-step timestamping. When running
one-step sync timestamping, the HW is configured to insert the TX time
into the frame, so there is no reason to keep the skb anymore. As in
this case the HW will never generate an interrupt to say that the frame
was timestamped, then the frame will never released.
Fix this by freeing the frame in case of one-step timestamping.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2025-07-03 09:15
Updated : 2025-12-18 21:06
NVD link : CVE-2025-38148
Mitre link : CVE-2025-38148
CVE.ORG link : CVE-2025-38148
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-401
Missing Release of Memory after Effective Lifetime
