We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-37886

pds_core: make wait_context part of q_info



Description

In the Linux kernel, the following vulnerability has been resolved: pds_core: make wait_context part of q_info Make the wait_context a full part of the q_info struct rather than a stack variable that goes away after pdsc_adminq_post() is done so that the context is still available after the wait loop has given up. There was a case where a slow development firmware caused the adminq request to time out, but then later the FW finally finished the request and sent the interrupt. The handler tried to complete_all() the completion context that had been created on the stack in pdsc_adminq_post() but no longer existed. This caused bad pointer usage, kernel crashes, and much wailing and gnashing of teeth.

Reserved 2025-04-16 | Published 2025-05-09 | Updated 2025-05-26 | Assigner Linux

Product status

Default status
unaffected

01ba61b55b2041a39c54aefb3153c770dd59a0ef before 1d7c4b2b0bbfb09b55b2dc0e2355d7936bf89381
affected

01ba61b55b2041a39c54aefb3153c770dd59a0ef before 66d7702b42ffdf0dce4808626088268a4e905ca6
affected

01ba61b55b2041a39c54aefb3153c770dd59a0ef before 520f012fe75fb8efc9f16a57ef929a7a2115d892
affected

01ba61b55b2041a39c54aefb3153c770dd59a0ef before 3f77c3dfffc7063428b100c4945ca2a7a8680380
affected

Default status
affected

6.4
affected

Any version before 6.4
unaffected

6.6.89
unaffected

6.12.26
unaffected

6.14.5
unaffected

6.15
unaffected

References

git.kernel.org/...c/1d7c4b2b0bbfb09b55b2dc0e2355d7936bf89381

git.kernel.org/...c/66d7702b42ffdf0dce4808626088268a4e905ca6

git.kernel.org/...c/520f012fe75fb8efc9f16a57ef929a7a2115d892

git.kernel.org/...c/3f77c3dfffc7063428b100c4945ca2a7a8680380

cve.org (CVE-2025-37886)

nvd.nist.gov (CVE-2025-37886)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-37886

Support options

Helpdesk Chat, Email, Knowledgebase