Home

Description

In the Linux kernel, the following vulnerability has been resolved: zram: fix slot write race condition Parallel concurrent writes to the same zram index result in leaked zsmalloc handles. Schematically we can have something like this: CPU0 CPU1 zram_slot_lock() zs_free(handle) zram_slot_lock() zram_slot_lock() zs_free(handle) zram_slot_lock() compress compress handle = zs_malloc() handle = zs_malloc() zram_slot_lock zram_set_handle(handle) zram_slot_lock zram_slot_lock zram_set_handle(handle) zram_slot_lock Either CPU0 or CPU1 zsmalloc handle will leak because zs_free() is done too early. In fact, we need to reset zram entry right before we set its new handle, all under the same slot lock scope.

PUBLISHED Reserved 2025-04-16 | Published 2025-10-04 | Updated 2025-10-04 | Assigner Linux

Product status

Default status
unaffected

71268035f5d734ad6373d953298bd5779985497a before ff750e9f2c4d63854c33967d1646b5e89a9a19a2
affected

71268035f5d734ad6373d953298bd5779985497a before ce4be9e4307c5a60701ff6e0cafa74caffdc54ce
affected

Default status
affected

6.14
affected

Any version before 6.14
unaffected

6.16.9
unaffected

6.17
unaffected

References

git.kernel.org/...c/ff750e9f2c4d63854c33967d1646b5e89a9a19a2

git.kernel.org/...c/ce4be9e4307c5a60701ff6e0cafa74caffdc54ce

cve.org (CVE-2025-39941)

nvd.nist.gov (CVE-2025-39941)

Download JSON