In the Linux kernel, the following vulnerability has been resolved:
um: virtiouml: Fix use-after-free after putdevice in probe
When registervirtiodevice() fails in virtioumlprobe(), the code sets vu_dev->registered = 1 even though the device was not successfully registered. This can lead to use-after-free or other issues.
[
{
"signature_type": "Line",
"signature_version": "v1",
"id": "CVE-2025-39951-1ff27ead",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@aaf900a83508c8cd5cdf765e7749f9076196ec7f",
"digest": {
"line_hashes": [
"109794253921313251962437110952362873875",
"276245806437486389278209689741208439435",
"255285548486724284387554962649241820711",
"61037720828035068501585376313263951120",
"232902792761014769858091008328008042581",
"19012933491905526180524580645478331870",
"133164151839799762904627697519615111408"
],
"threshold": 0.9
},
"deprecated": false,
"target": {
"file": "arch/um/drivers/virtio_uml.c"
}
},
{
"signature_type": "Line",
"signature_version": "v1",
"id": "CVE-2025-39951-56e649b3",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@00e98b5a69034b251bb36dc6e7123d7648e218e4",
"digest": {
"line_hashes": [
"109794253921313251962437110952362873875",
"276245806437486389278209689741208439435",
"255285548486724284387554962649241820711",
"61037720828035068501585376313263951120",
"232902792761014769858091008328008042581",
"19012933491905526180524580645478331870",
"133164151839799762904627697519615111408"
],
"threshold": 0.9
},
"deprecated": false,
"target": {
"file": "arch/um/drivers/virtio_uml.c"
}
},
{
"signature_type": "Line",
"signature_version": "v1",
"id": "CVE-2025-39951-689570fa",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c2ff91255e0157b356cff115d8dc3eeb5162edf2",
"digest": {
"line_hashes": [
"109794253921313251962437110952362873875",
"276245806437486389278209689741208439435",
"255285548486724284387554962649241820711",
"61037720828035068501585376313263951120",
"232902792761014769858091008328008042581",
"19012933491905526180524580645478331870",
"133164151839799762904627697519615111408"
],
"threshold": 0.9
},
"deprecated": false,
"target": {
"file": "arch/um/drivers/virtio_uml.c"
}
},
{
"signature_type": "Function",
"signature_version": "v1",
"id": "CVE-2025-39951-82d3ca09",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@aaf900a83508c8cd5cdf765e7749f9076196ec7f",
"digest": {
"length": 1108.0,
"function_hash": "319119972545919928944732401765987653837"
},
"deprecated": false,
"target": {
"function": "virtio_uml_probe",
"file": "arch/um/drivers/virtio_uml.c"
}
},
{
"signature_type": "Function",
"signature_version": "v1",
"id": "CVE-2025-39951-8f4d7a83",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c2ff91255e0157b356cff115d8dc3eeb5162edf2",
"digest": {
"length": 1136.0,
"function_hash": "109925205911796458904098907517602941912"
},
"deprecated": false,
"target": {
"function": "virtio_uml_probe",
"file": "arch/um/drivers/virtio_uml.c"
}
},
{
"signature_type": "Function",
"signature_version": "v1",
"id": "CVE-2025-39951-93a1cd57",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5e94e44c9cb30d7a383d8ac227f24a8c9326b770",
"digest": {
"length": 1108.0,
"function_hash": "319119972545919928944732401765987653837"
},
"deprecated": false,
"target": {
"function": "virtio_uml_probe",
"file": "arch/um/drivers/virtio_uml.c"
}
},
{
"signature_type": "Line",
"signature_version": "v1",
"id": "CVE-2025-39951-a248c918",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5e94e44c9cb30d7a383d8ac227f24a8c9326b770",
"digest": {
"line_hashes": [
"109794253921313251962437110952362873875",
"276245806437486389278209689741208439435",
"255285548486724284387554962649241820711",
"61037720828035068501585376313263951120",
"232902792761014769858091008328008042581",
"19012933491905526180524580645478331870",
"133164151839799762904627697519615111408"
],
"threshold": 0.9
},
"deprecated": false,
"target": {
"file": "arch/um/drivers/virtio_uml.c"
}
},
{
"signature_type": "Function",
"signature_version": "v1",
"id": "CVE-2025-39951-b866ee11",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7ebf70cf181651fe3f2e44e95e7e5073d594c9c0",
"digest": {
"length": 1136.0,
"function_hash": "109925205911796458904098907517602941912"
},
"deprecated": false,
"target": {
"function": "virtio_uml_probe",
"file": "arch/um/drivers/virtio_uml.c"
}
},
{
"signature_type": "Line",
"signature_version": "v1",
"id": "CVE-2025-39951-c9d89976",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4f364023ddcfe83f7073b973a9cb98584b7f2a46",
"digest": {
"line_hashes": [
"109794253921313251962437110952362873875",
"276245806437486389278209689741208439435",
"255285548486724284387554962649241820711",
"61037720828035068501585376313263951120",
"232902792761014769858091008328008042581",
"19012933491905526180524580645478331870",
"133164151839799762904627697519615111408"
],
"threshold": 0.9
},
"deprecated": false,
"target": {
"file": "arch/um/drivers/virtio_uml.c"
}
},
{
"signature_type": "Line",
"signature_version": "v1",
"id": "CVE-2025-39951-f4a72cf8",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7ebf70cf181651fe3f2e44e95e7e5073d594c9c0",
"digest": {
"line_hashes": [
"109794253921313251962437110952362873875",
"276245806437486389278209689741208439435",
"255285548486724284387554962649241820711",
"61037720828035068501585376313263951120",
"232902792761014769858091008328008042581",
"19012933491905526180524580645478331870",
"133164151839799762904627697519615111408"
],
"threshold": 0.9
},
"deprecated": false,
"target": {
"file": "arch/um/drivers/virtio_uml.c"
}
},
{
"signature_type": "Function",
"signature_version": "v1",
"id": "CVE-2025-39951-fa94c1a0",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4f364023ddcfe83f7073b973a9cb98584b7f2a46",
"digest": {
"length": 1108.0,
"function_hash": "319119972545919928944732401765987653837"
},
"deprecated": false,
"target": {
"function": "virtio_uml_probe",
"file": "arch/um/drivers/virtio_uml.c"
}
},
{
"signature_type": "Function",
"signature_version": "v1",
"id": "CVE-2025-39951-fc51e267",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@00e98b5a69034b251bb36dc6e7123d7648e218e4",
"digest": {
"length": 1108.0,
"function_hash": "319119972545919928944732401765987653837"
},
"deprecated": false,
"target": {
"function": "virtio_uml_probe",
"file": "arch/um/drivers/virtio_uml.c"
}
}
]