CVE-2025-39689

In the Linux kernel, the following vulnerability has been resolved: ftrace: Also allocate and copy hash for reading of filter files Currently the reader of set_ftrace_filter and set_ftrace_notrace just adds the pointer to the global tracer hash to its iterator. Unlike the writer that allocates a copy of the hash, the reader keeps the pointer to the filter hashes. This is problematic because this pointer is static across function calls that release the locks that can update the global tracer hashes. This can cause UAF and similar bugs. Allocate and copy the hash for reading the filter files like it is done for the writers. This not only fixes UAF bugs, but also makes the code a bit simpler as it doesn't have to differentiate when to free the iterator's hash between writers and readers.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc2:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

08 Jan 2026, 14:52

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/12064e1880fc9202be75ff668205b1703d92f74f - () https://git.kernel.org/stable/c/12064e1880fc9202be75ff668205b1703d92f74f - Patch
References () https://git.kernel.org/stable/c/3b114a3282ab1a12cb4618a8f45db5d7185e784a - () https://git.kernel.org/stable/c/3b114a3282ab1a12cb4618a8f45db5d7185e784a - Patch
References () https://git.kernel.org/stable/c/64db338140d2bad99a0a8c6a118dd60b3e1fb8cb - () https://git.kernel.org/stable/c/64db338140d2bad99a0a8c6a118dd60b3e1fb8cb - Patch
References () https://git.kernel.org/stable/c/a40c69f4f1ed96acbcd62e9b5ff3a596f0a91309 - () https://git.kernel.org/stable/c/a40c69f4f1ed96acbcd62e9b5ff3a596f0a91309 - Patch
References () https://git.kernel.org/stable/c/bfb336cf97df7b37b2b2edec0f69773e06d11955 - () https://git.kernel.org/stable/c/bfb336cf97df7b37b2b2edec0f69773e06d11955 - Patch
References () https://git.kernel.org/stable/c/c4cd93811e038d19f961985735ef7bb128078dfb - () https://git.kernel.org/stable/c/c4cd93811e038d19f961985735ef7bb128078dfb - Patch
References () https://git.kernel.org/stable/c/c591ba1acd081d4980713e47869dd1cc3d963d19 - () https://git.kernel.org/stable/c/c591ba1acd081d4980713e47869dd1cc3d963d19 - Patch
References () https://git.kernel.org/stable/c/e0b6b223167e1edde5c82edf38e393c06eda1f13 - () https://git.kernel.org/stable/c/e0b6b223167e1edde5c82edf38e393c06eda1f13 - Patch
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory, Mailing List
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory, Mailing List
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
CPE cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-416
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

03 Nov 2025, 18:16

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html -
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html -

05 Sep 2025, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-05 18:15

Updated : 2026-01-08 14:52


NVD link : CVE-2025-39689

Mitre link : CVE-2025-39689

CVE.ORG link : CVE-2025-39689


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-416

Use After Free