In the Linux kernel, the following vulnerability has been resolved:
net: phy: mscc: Fix memory leak when using one step timestamping
Fix memory leak when running one-step timestamping. When running
one-step sync timestamping, the HW is configured to insert the TX time
into the frame, so there is no reason to keep the skb anymore. As in
this case the HW will never generate an interrupt to say that the frame
was timestamped, then the frame will never released.
Fix this by freeing the frame in case of one-step timestamping.
Metrics
Affected Vendors & Products
References
History
Fri, 04 Jul 2025 00:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Thu, 03 Jul 2025 09:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: net: phy: mscc: Fix memory leak when using one step timestamping Fix memory leak when running one-step timestamping. When running one-step sync timestamping, the HW is configured to insert the TX time into the frame, so there is no reason to keep the skb anymore. As in this case the HW will never generate an interrupt to say that the frame was timestamped, then the frame will never released. Fix this by freeing the frame in case of one-step timestamping. | |
Title | net: phy: mscc: Fix memory leak when using one step timestamping | |
References |
|
|

Status: PUBLISHED
Assigner: Linux
Published: 2025-07-03T08:35:53.544Z
Updated: 2025-07-28T04:13:36.247Z
Reserved: 2025-04-16T04:51:23.988Z
Link: CVE-2025-38148

No data.

Status : Awaiting Analysis
Published: 2025-07-03T09:15:29.703
Modified: 2025-07-03T15:13:53.147
Link: CVE-2025-38148
