We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-38154

bpf, sockmap: Avoid using sk_socket after free when sending



Description

In the Linux kernel, the following vulnerability has been resolved: bpf, sockmap: Avoid using sk_socket after free when sending The sk->sk_socket is not locked or referenced in backlog thread, and during the call to skb_send_sock(), there is a race condition with the release of sk_socket. All types of sockets(tcp/udp/unix/vsock) will be affected. Race conditions: ''' CPU0 CPU1 backlog::skb_send_sock sendmsg_unlocked sock_sendmsg sock_sendmsg_nosec close(fd): ... ops->release() -> sock_map_close() sk_socket->ops = NULL free(socket) sock->ops->sendmsg ^ panic here ''' The ref of psock become 0 after sock_map_close() executed. ''' void sock_map_close() { ... if (likely(psock)) { ... // !! here we remove psock and the ref of psock become 0 sock_map_remove_links(sk, psock) psock = sk_psock_get(sk); if (unlikely(!psock)) goto no_psock; <=== Control jumps here via goto ... cancel_delayed_work_sync(&psock->work); <=== not executed sk_psock_put(sk, psock); ... } ''' Based on the fact that we already wait for the workqueue to finish in sock_map_close() if psock is held, we simply increase the psock reference count to avoid race conditions. With this patch, if the backlog thread is running, sock_map_close() will wait for the backlog thread to complete and cancel all pending work. If no backlog running, any pending work that hasn't started by then will fail when invoked by sk_psock_get(), as the psock reference count have been zeroed, and sk_psock_drop() will cancel all jobs via cancel_delayed_work_sync(). In summary, we require synchronization to coordinate the backlog thread and close() thread. The panic I catched: ''' Workqueue: events sk_psock_backlog RIP: 0010:sock_sendmsg+0x21d/0x440 RAX: 0000000000000000 RBX: ffffc9000521fad8 RCX: 0000000000000001 ... Call Trace: <TASK> ? die_addr+0x40/0xa0 ? exc_general_protection+0x14c/0x230 ? asm_exc_general_protection+0x26/0x30 ? sock_sendmsg+0x21d/0x440 ? sock_sendmsg+0x3e0/0x440 ? __pfx_sock_sendmsg+0x10/0x10 __skb_send_sock+0x543/0xb70 sk_psock_backlog+0x247/0xb80 ... '''

Reserved 2025-04-16 | Published 2025-07-03 | Updated 2025-07-03 | Assigner Linux

Product status

Default status
unaffected

4959ffc65a0e94f8acaac20deac49f89e6ded52d before 4edb40b05cb6a261775abfd8046804ca139a5546
affected

5eabdf17fed2ad41b836bb4055ec36d95e512c50 before b19cbf0b9a91f5a0d93fbcd761ff71c48ab40ed9
affected

e946428439a0d2079959f5603256ac51b6047017 before 4c6fa65ab2aec7df94809478c8d28ef38676a1b7
affected

4b4647add7d3c8530493f7247d11e257ee425bf0 before 15c0250dae3b48a398447d2b364603821ed4ed90
affected

4b4647add7d3c8530493f7247d11e257ee425bf0 before 7c0a16f6ea2b1c82a03bccd5d1bdb4a7bbd4d987
affected

4b4647add7d3c8530493f7247d11e257ee425bf0 before 8259eb0e06d8f64c700f5fbdb28a5c18e10de291
affected

3627605de498639a3c586c8684d12c89cba11073
affected

Default status
affected

6.10
affected

Any version before 6.10
unaffected

5.15.186
unaffected

6.1.142
unaffected

6.6.94
unaffected

6.12.34
unaffected

6.15.3
unaffected

6.16-rc1
unaffected

References

git.kernel.org/...c/4edb40b05cb6a261775abfd8046804ca139a5546

git.kernel.org/...c/b19cbf0b9a91f5a0d93fbcd761ff71c48ab40ed9

git.kernel.org/...c/4c6fa65ab2aec7df94809478c8d28ef38676a1b7

git.kernel.org/...c/15c0250dae3b48a398447d2b364603821ed4ed90

git.kernel.org/...c/7c0a16f6ea2b1c82a03bccd5d1bdb4a7bbd4d987

git.kernel.org/...c/8259eb0e06d8f64c700f5fbdb28a5c18e10de291

cve.org (CVE-2025-38154)

nvd.nist.gov (CVE-2025-38154)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-38154

Support options

Helpdesk Chat, Email, Knowledgebase