In the Linux kernel, the following vulnerability has been resolved:
PCI/pwrctrl: Cancel outstanding rescan work when unregistering
It's possible to trigger use-after-free here by:
(a) forcing rescan_work_func() to take a long time and
(b) utilizing a pwrctrl driver that may be unloaded for some reason
Cancel outstanding work to ensure it is finished before we allow our data
structures to be cleaned up.
[bhelgaas: tidy commit log]
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2025, 20:11
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| CWE | CWE-416 | |
| CPE | cpe:2.3:o:linux:linux_kernel:6.11:-:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.11:rc7:*:*:*:*:*:* |
|
| References | () https://git.kernel.org/stable/c/8b926f237743f020518162c62b93cb7107a2b5eb - Patch | |
| References | () https://git.kernel.org/stable/c/b3ad6d23fec23fbef382ce9ea640c37446593cf5 - Patch | |
| First Time |
Linux linux Kernel
Linux |
Information
Published : 2025-07-03 09:15
Updated : 2025-11-20 20:11
NVD link : CVE-2025-38137
Mitre link : CVE-2025-38137
CVE.ORG link : CVE-2025-38137
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free
