In the Linux kernel, the following vulnerability has been resolved:
um: virtio_uml: Fix use-after-free after put_device in probe
When register_virtio_device() fails in virtio_uml_probe(),
the code sets vu_dev->registered = 1 even though
the device was not successfully registered.
This can lead to use-after-free or other issues.
um: virtio_uml: Fix use-after-free after put_device in probe
When register_virtio_device() fails in virtio_uml_probe(),
the code sets vu_dev->registered = 1 even though
the device was not successfully registered.
This can lead to use-after-free or other issues.
Metrics
Affected Vendors & Products
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sat, 04 Oct 2025 07:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: um: virtio_uml: Fix use-after-free after put_device in probe When register_virtio_device() fails in virtio_uml_probe(), the code sets vu_dev->registered = 1 even though the device was not successfully registered. This can lead to use-after-free or other issues. | |
Title | um: virtio_uml: Fix use-after-free after put_device in probe | |
References |
|
|

Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2025-10-04T07:37:07.273Z
Reserved: 2025-04-16T07:20:57.148Z
Link: CVE-2025-39951

No data.

Status : Received
Published: 2025-10-04T08:15:48.380
Modified: 2025-10-04T08:15:48.380
Link: CVE-2025-39951

No data.

No data.