Home

Description

In the Linux kernel, the following vulnerability has been resolved: thunderbolt: Fix use-after-free in tb_dp_dprx_work The original code relies on cancel_delayed_work() in tb_dp_dprx_stop(), which does not ensure that the delayed work item tunnel->dprx_work has fully completed if it was already running. This leads to use-after-free scenarios where tb_tunnel is deallocated by tb_tunnel_put(), while tunnel->dprx_work remains active and attempts to dereference tb_tunnel in tb_dp_dprx_work(). A typical race condition is illustrated below: CPU 0 | CPU 1 tb_dp_tunnel_active() | tb_deactivate_and_free_tunnel()| tb_dp_dprx_start() tb_tunnel_deactivate() | queue_delayed_work() tb_dp_activate() | tb_dp_dprx_stop() | tb_dp_dprx_work() //delayed worker cancel_delayed_work() | tb_tunnel_put(tunnel); | | tunnel = container_of(...); //UAF | tunnel-> //UAF Replacing cancel_delayed_work() with cancel_delayed_work_sync() is not feasible as it would introduce a deadlock: both tb_dp_dprx_work() and the cleanup path acquire tb->lock, and cancel_delayed_work_sync() would wait indefinitely for the work item that cannot proceed. Instead, implement proper reference counting: - If cancel_delayed_work() returns true (work is pending), we release the reference in the stop function. - If it returns false (work is executing or already completed), the reference is released in delayed work function itself. This ensures the tb_tunnel remains valid during work item execution while preventing memory leaks. This bug was found by static analysis.

PUBLISHED Reserved 2025-04-16 | Published 2025-10-18 | Updated 2025-10-18 | Assigner Linux

Product status

Default status
unaffected

d6d458d42e1e1544a18f37f1d5c840e00d5261b9 before c07923f6a8729fc27ee652221a51702ff6654097
affected

d6d458d42e1e1544a18f37f1d5c840e00d5261b9 before 67600ccfc4f38ebd331b9332ac94717bfbc87ea7
affected

Default status
affected

6.14
affected

Any version before 6.14
unaffected

6.17.3
unaffected

6.18-rc1
unaffected

References

git.kernel.org/...c/c07923f6a8729fc27ee652221a51702ff6654097

git.kernel.org/...c/67600ccfc4f38ebd331b9332ac94717bfbc87ea7

cve.org (CVE-2025-40002)

nvd.nist.gov (CVE-2025-40002)

Download JSON