We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-21914

slimbus: messaging: Free transaction ID in delayed interrupt scenario



Description

In the Linux kernel, the following vulnerability has been resolved: slimbus: messaging: Free transaction ID in delayed interrupt scenario In case of interrupt delay for any reason, slim_do_transfer() returns timeout error but the transaction ID (TID) is not freed. This results into invalid memory access inside qcom_slim_ngd_rx_msgq_cb() due to invalid TID. Fix the issue by freeing the TID in slim_do_transfer() before returning timeout error to avoid invalid memory access. Call trace: __memcpy_fromio+0x20/0x190 qcom_slim_ngd_rx_msgq_cb+0x130/0x290 [slim_qcom_ngd_ctrl] vchan_complete+0x2a0/0x4a0 tasklet_action_common+0x274/0x700 tasklet_action+0x28/0x3c _stext+0x188/0x620 run_ksoftirqd+0x34/0x74 smpboot_thread_fn+0x1d8/0x464 kthread+0x178/0x238 ret_from_fork+0x10/0x20 Code: aa0003e8 91000429 f100044a 3940002b (3800150b) ---[ end trace 0fe00bec2b975c99 ]--- Kernel panic - not syncing: Oops: Fatal exception in interrupt.

Reserved 2024-12-29 | Published 2025-04-01 | Updated 2025-05-04 | Assigner Linux

Product status

Default status
unaffected

afbdcc7c384b0d446da08b1e0901dc176b41b9e0 before cec8c0ac173fe5321f03fdb1a09a9cb69bc9a9fe
affected

afbdcc7c384b0d446da08b1e0901dc176b41b9e0 before a32e5198a9134772eb03f7b72a7849094c55bda9
affected

afbdcc7c384b0d446da08b1e0901dc176b41b9e0 before 09d34c4cbc38485c7514069f25348e439555b282
affected

afbdcc7c384b0d446da08b1e0901dc176b41b9e0 before 18ae4cee05c310c299ba75d7477dcf34be67aa16
affected

afbdcc7c384b0d446da08b1e0901dc176b41b9e0 before faac8e894014e8167471a8e4a5eb35a8fefbb82a
affected

afbdcc7c384b0d446da08b1e0901dc176b41b9e0 before 6abf3d8bb51cbaf886c3f08109a0462890b10db6
affected

afbdcc7c384b0d446da08b1e0901dc176b41b9e0 before 0c541c8f6da23e0b92f0a6216d899659a7572074
affected

afbdcc7c384b0d446da08b1e0901dc176b41b9e0 before dcb0d43ba8eb9517e70b1a0e4b0ae0ab657a0e5a
affected

Default status
affected

4.16
affected

Any version before 4.16
unaffected

5.4.291
unaffected

5.10.235
unaffected

5.15.179
unaffected

6.1.131
unaffected

6.6.83
unaffected

6.12.19
unaffected

6.13.7
unaffected

6.14
unaffected

References

git.kernel.org/...c/cec8c0ac173fe5321f03fdb1a09a9cb69bc9a9fe

git.kernel.org/...c/a32e5198a9134772eb03f7b72a7849094c55bda9

git.kernel.org/...c/09d34c4cbc38485c7514069f25348e439555b282

git.kernel.org/...c/18ae4cee05c310c299ba75d7477dcf34be67aa16

git.kernel.org/...c/faac8e894014e8167471a8e4a5eb35a8fefbb82a

git.kernel.org/...c/6abf3d8bb51cbaf886c3f08109a0462890b10db6

git.kernel.org/...c/0c541c8f6da23e0b92f0a6216d899659a7572074

git.kernel.org/...c/dcb0d43ba8eb9517e70b1a0e4b0ae0ab657a0e5a

cve.org (CVE-2025-21914)

nvd.nist.gov (CVE-2025-21914)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-21914

Support options

Helpdesk Chat, Email, Knowledgebase