Home

Description

In the Linux kernel, the following vulnerability has been resolved: media: ivsc: Fix crash at shutdown due to missing mei_cldev_disable() calls Both the ACE and CSI driver are missing a mei_cldev_disable() call in their remove() function. This causes the mei_cl client to stay part of the mei_device->file_list list even though its memory is freed by mei_cl_bus_dev_release() calling kfree(cldev->cl). This leads to a use-after-free when mei_vsc_remove() runs mei_stop() which first removes all mei bus devices calling mei_ace_remove() and mei_csi_remove() followed by mei_cl_bus_dev_release() and then calls mei_cl_all_disconnect() which walks over mei_device->file_list dereferecing the just freed cldev->cl. And mei_vsc_remove() it self is run at shutdown because of the platform_device_unregister(tp->pdev) in vsc_tp_shutdown() When building a kernel with KASAN this leads to the following KASAN report: [ 106.634504] ================================================================== [ 106.634623] BUG: KASAN: slab-use-after-free in mei_cl_set_disconnected (drivers/misc/mei/client.c:783) mei [ 106.634683] Read of size 4 at addr ffff88819cb62018 by task systemd-shutdow/1 [ 106.634729] [ 106.634767] Tainted: [E]=UNSIGNED_MODULE [ 106.634770] Hardware name: Dell Inc. XPS 16 9640/09CK4V, BIOS 1.12.0 02/10/2025 [ 106.634773] Call Trace: [ 106.634777] <TASK> ... [ 106.634871] kasan_report (mm/kasan/report.c:221 mm/kasan/report.c:636) [ 106.634901] mei_cl_set_disconnected (drivers/misc/mei/client.c:783) mei [ 106.634921] mei_cl_all_disconnect (drivers/misc/mei/client.c:2165 (discriminator 4)) mei [ 106.634941] mei_reset (drivers/misc/mei/init.c:163) mei ... [ 106.635042] mei_stop (drivers/misc/mei/init.c:348) mei [ 106.635062] mei_vsc_remove (drivers/misc/mei/mei_dev.h:784 drivers/misc/mei/platform-vsc.c:393) mei_vsc [ 106.635066] platform_remove (drivers/base/platform.c:1424) Add the missing mei_cldev_disable() calls so that the mei_cl gets removed from mei_device->file_list before it is freed to fix this.

PUBLISHED Reserved 2025-04-16 | Published 2025-09-05 | Updated 2025-09-29 | Assigner Linux

Product status

Default status
unaffected

29006e196a5661d9afc8152fa2bf8a5347ac17b4 (git) before 3c0e4cc4f55f9a1db2a761e4ffb27c9594245888
affected

29006e196a5661d9afc8152fa2bf8a5347ac17b4 (git) before 639f5b33fcd7c59157f29b09f6f2866eacf9279c
affected

29006e196a5661d9afc8152fa2bf8a5347ac17b4 (git) before 1dfe73394dcfc9b049c8da0dc181c45f156a5f49
affected

29006e196a5661d9afc8152fa2bf8a5347ac17b4 (git) before 0c92c49fc688cfadacc47ae99b06a31237702e9e
affected

Default status
affected

6.6
affected

Any version before 6.6
unaffected

6.6.103 (semver)
unaffected

6.12.44 (semver)
unaffected

6.16.4 (semver)
unaffected

6.17 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/3c0e4cc4f55f9a1db2a761e4ffb27c9594245888

git.kernel.org/...c/639f5b33fcd7c59157f29b09f6f2866eacf9279c

git.kernel.org/...c/1dfe73394dcfc9b049c8da0dc181c45f156a5f49

git.kernel.org/...c/0c92c49fc688cfadacc47ae99b06a31237702e9e

cve.org (CVE-2025-39711)

nvd.nist.gov (CVE-2025-39711)

Download JSON