Home

Description

In the Linux kernel, the following vulnerability has been resolved: padata: Fix pd UAF once and for all There is a race condition/UAF in padata_reorder that goes back to the initial commit. A reference count is taken at the start of the process in padata_do_parallel, and released at the end in padata_serial_worker. This reference count is (and only is) required for padata_replace to function correctly. If padata_replace is never called then there is no issue. In the function padata_reorder which serves as the core of padata, as soon as padata is added to queue->serial.list, and the associated spin lock released, that padata may be processed and the reference count on pd would go away. Fix this by getting the next padata before the squeue->serial lock is released. In order to make this possible, simplify padata_reorder by only calling it once the next padata arrives.

PUBLISHED Reserved 2025-04-16 | Published 2025-08-19 | Updated 2025-09-29 | Assigner Linux

Product status

Default status
unaffected

16295bec6398a3eedc9377e1af6ff4c71b98c300 before dbe3e911a59bda6de96e7cae387ff882c2c177fa
affected

16295bec6398a3eedc9377e1af6ff4c71b98c300 before cdf79bd2e1ecb3cc75631c73d8f4149be6019a52
affected

16295bec6398a3eedc9377e1af6ff4c71b98c300 before 71203f68c7749609d7fc8ae6ad054bdedeb24f91
affected

Default status
affected

2.6.34
affected

Any version before 2.6.34
unaffected

6.15.10
unaffected

6.16.1
unaffected

6.17
unaffected

References

git.kernel.org/...c/dbe3e911a59bda6de96e7cae387ff882c2c177fa

git.kernel.org/...c/cdf79bd2e1ecb3cc75631c73d8f4149be6019a52

git.kernel.org/...c/71203f68c7749609d7fc8ae6ad054bdedeb24f91

cve.org (CVE-2025-38584)

nvd.nist.gov (CVE-2025-38584)

Download JSON