Home

Description

In the Linux kernel, the following vulnerability has been resolved: futex: Prevent use-after-free during requeue-PI syzbot managed to trigger the following race: T1 T2 futex_wait_requeue_pi() futex_do_wait() schedule() futex_requeue() futex_proxy_trylock_atomic() futex_requeue_pi_prepare() requeue_pi_wake_futex() futex_requeue_pi_complete() /* preempt */ * timeout/ signal wakes T1 * futex_requeue_pi_wakeup_sync() // Q_REQUEUE_PI_LOCKED futex_hash_put() // back to userland, on stack futex_q is garbage /* back */ wake_up_state(q->task, TASK_NORMAL); In this scenario futex_wait_requeue_pi() is able to leave without using futex_q::lock_ptr for synchronization. This can be prevented by reading futex_q::task before updating the futex_q::requeue_state. A reference on the task_struct is not needed because requeue_pi_wake_futex() is invoked with a spinlock_t held which implies a RCU read section. Even if T1 terminates immediately after, the task_struct will remain valid during T2's wake_up_state(). A READ_ONCE on futex_q::task before futex_requeue_pi_complete() is enough because it ensures that the variable is read before the state is updated. Read futex_q::task before updating the requeue state, use it for the following wakeup.

PUBLISHED Reserved 2025-04-16 | Published 2025-10-15 | Updated 2025-10-15 | Assigner Linux

Product status

Default status
unaffected

07d91ef510fb16a2e0ca7453222105835b7ba3b8 before cb5d19a61274b51b49601214a87af573b43d60fa
affected

07d91ef510fb16a2e0ca7453222105835b7ba3b8 before 348736955ed6ca6e99ca24b93b1d3fbfe352c181
affected

07d91ef510fb16a2e0ca7453222105835b7ba3b8 before a170b9c0dde83312b8b58ccc91509c7c15711641
affected

07d91ef510fb16a2e0ca7453222105835b7ba3b8 before d824b2dbdcfe3c390278dd9652ea526168ef6850
affected

07d91ef510fb16a2e0ca7453222105835b7ba3b8 before b549113738e8c751b613118032a724b772aa83f2
affected

Default status
affected

5.15
affected

Any version before 5.15
unaffected

6.1.155
unaffected

6.6.109
unaffected

6.12.50
unaffected

6.16.10
unaffected

6.17
unaffected

References

git.kernel.org/...c/cb5d19a61274b51b49601214a87af573b43d60fa

git.kernel.org/...c/348736955ed6ca6e99ca24b93b1d3fbfe352c181

git.kernel.org/...c/a170b9c0dde83312b8b58ccc91509c7c15711641

git.kernel.org/...c/d824b2dbdcfe3c390278dd9652ea526168ef6850

git.kernel.org/...c/b549113738e8c751b613118032a724b772aa83f2

cve.org (CVE-2025-39977)

nvd.nist.gov (CVE-2025-39977)

Download JSON