In the Linux kernel, the following vulnerability has been resolved:
media: tuner: xc5000: Fix use-after-free in xc5000_release
The original code uses canceldelayedwork() in xc5000release(), which does not guarantee that the delayed work item timersleep has fully completed if it was already running. This leads to use-after-free scenarios where xc5000release() may free the xc5000priv while timersleep is still active and attempts to dereference the xc5000priv.
A typical race condition is illustrated below:
CPU 0 (release thread) | CPU 1 (delayed work callback) xc5000release() | xc5000dotimersleep() canceldelayedwork() | hybridtunerreleasestate(priv) | kfree(priv) | | priv = containerof() // UAF
Replace canceldelayedwork() with canceldelayedworksync() to ensure that the timersleep is properly canceled before the xc5000_priv memory is deallocated.
A deadlock concern was considered: xc5000release() is called in a process context and is not holding any locks that the timersleep work item might also need. Therefore, the use of the _sync() variant is safe here.
This bug was initially identified through static analysis.
[hverkuil: fix typo in Subject: tunner -> tuner]
[
{
"signature_version": "v1",
"deprecated": false,
"digest": {
"line_hashes": [
"132448868586259340604605461769976212765",
"302403045480296616586034734401044868349",
"258757016581832464925278860113051819367",
"172319112661108374669557314375284987179"
],
"threshold": 0.9
},
"id": "CVE-2025-39994-764ca160",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@effb1c19583bca7022fa641a70766de45c6d41ac",
"signature_type": "Line",
"target": {
"file": "drivers/media/tuners/xc5000.c"
}
},
{
"signature_version": "v1",
"deprecated": false,
"digest": {
"line_hashes": [
"132448868586259340604605461769976212765",
"302403045480296616586034734401044868349",
"258757016581832464925278860113051819367",
"172319112661108374669557314375284987179"
],
"threshold": 0.9
},
"id": "CVE-2025-39994-9db2f2a0",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3f876cd47ed8bca1e28d68435845949f51f90703",
"signature_type": "Line",
"target": {
"file": "drivers/media/tuners/xc5000.c"
}
},
{
"signature_version": "v1",
"deprecated": false,
"digest": {
"line_hashes": [
"132448868586259340604605461769976212765",
"302403045480296616586034734401044868349",
"258757016581832464925278860113051819367",
"172319112661108374669557314375284987179"
],
"threshold": 0.9
},
"id": "CVE-2025-39994-a16e3eac",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4266f012806fc18e46da4a04d130df59a4946f93",
"signature_type": "Line",
"target": {
"file": "drivers/media/tuners/xc5000.c"
}
},
{
"signature_version": "v1",
"deprecated": false,
"digest": {
"line_hashes": [
"132448868586259340604605461769976212765",
"302403045480296616586034734401044868349",
"258757016581832464925278860113051819367",
"172319112661108374669557314375284987179"
],
"threshold": 0.9
},
"id": "CVE-2025-39994-a45bf81f",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@71ed8b81a4906cb785966910f39cf7f5ad60a69e",
"signature_type": "Line",
"target": {
"file": "drivers/media/tuners/xc5000.c"
}
},
{
"signature_version": "v1",
"deprecated": false,
"digest": {
"line_hashes": [
"132448868586259340604605461769976212765",
"302403045480296616586034734401044868349",
"258757016581832464925278860113051819367",
"172319112661108374669557314375284987179"
],
"threshold": 0.9
},
"id": "CVE-2025-39994-c6e02903",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bc4ffd962ce16a154c44c68853b9d93f5b6fc4b8",
"signature_type": "Line",
"target": {
"file": "drivers/media/tuners/xc5000.c"
}
},
{
"signature_version": "v1",
"deprecated": false,
"digest": {
"line_hashes": [
"132448868586259340604605461769976212765",
"302403045480296616586034734401044868349",
"258757016581832464925278860113051819367",
"172319112661108374669557314375284987179"
],
"threshold": 0.9
},
"id": "CVE-2025-39994-d2342e61",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e2f5eaafc0306a76fb1cb760aae804b065b8a341",
"signature_type": "Line",
"target": {
"file": "drivers/media/tuners/xc5000.c"
}
},
{
"signature_version": "v1",
"deprecated": false,
"digest": {
"line_hashes": [
"132448868586259340604605461769976212765",
"302403045480296616586034734401044868349",
"258757016581832464925278860113051819367",
"172319112661108374669557314375284987179"
],
"threshold": 0.9
},
"id": "CVE-2025-39994-dffad53c",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9a00de20ed8ba90888479749b87bc1532cded4ce",
"signature_type": "Line",
"target": {
"file": "drivers/media/tuners/xc5000.c"
}
},
{
"signature_version": "v1",
"deprecated": false,
"digest": {
"line_hashes": [
"132448868586259340604605461769976212765",
"302403045480296616586034734401044868349",
"258757016581832464925278860113051819367",
"172319112661108374669557314375284987179"
],
"threshold": 0.9
},
"id": "CVE-2025-39994-e9437afd",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@df0303b4839520b84d9367c2fad65b13650a4d42",
"signature_type": "Line",
"target": {
"file": "drivers/media/tuners/xc5000.c"
}
},
{
"signature_version": "v1",
"deprecated": false,
"digest": {
"line_hashes": [
"132448868586259340604605461769976212765",
"302403045480296616586034734401044868349",
"258757016581832464925278860113051819367",
"172319112661108374669557314375284987179"
],
"threshold": 0.9
},
"id": "CVE-2025-39994-ea99b22b",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@40b7a19f321e65789612ebaca966472055dab48c",
"signature_type": "Line",
"target": {
"file": "drivers/media/tuners/xc5000.c"
}
}
]