Home

Description

In the Linux kernel, the following vulnerability has been resolved: cpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request() The cpufreq_cpu_put() call in update_qos_request() takes place too early because the latter subsequently calls freq_qos_update_request() that indirectly accesses the policy object in question through the QoS request object passed to it. Fortunately, update_qos_request() is called under intel_pstate_driver_lock, so this issue does not matter for changing the intel_pstate operation mode, but it theoretically can cause a crash to occur on CPU device hot removal (which currently can only happen in virt, but it is formally supported nevertheless). Address this issue by modifying update_qos_request() to drop the reference to the policy later.

PUBLISHED Reserved 2025-04-16 | Published 2025-11-12 | Updated 2025-12-01 | Assigner Linux

Product status

Default status
unaffected

da5c504c7aae96db68c4b38e2564a88e91842d89 (git) before 15ac9579ebdaf22a37d7f60b3a8efc1029732ef9
affected

da5c504c7aae96db68c4b38e2564a88e91842d89 (git) before bc26564bcc659beb6d977cd6eb394041ec2f2851
affected

da5c504c7aae96db68c4b38e2564a88e91842d89 (git) before ad4e8f9bdbef11a19b7cb93e7f313bf59bdcc3b4
affected

da5c504c7aae96db68c4b38e2564a88e91842d89 (git) before 0a58d3e77b22b087a57831c87cafd360e144a5bd
affected

da5c504c7aae96db68c4b38e2564a88e91842d89 (git) before 69a18ff6c60e8e113420f15355fad862cb45d38e
affected

da5c504c7aae96db68c4b38e2564a88e91842d89 (git) before ba63d4e9857a72a89e71a4eff9f2cc8c283e94c3
affected

da5c504c7aae96db68c4b38e2564a88e91842d89 (git) before 57e4a6aadf12578b96a038373cffd54b3a58b092
affected

da5c504c7aae96db68c4b38e2564a88e91842d89 (git) before 69e5d50fcf4093fb3f9f41c4f931f12c2ca8c467
affected

Default status
affected

5.4
affected

Any version before 5.4
unaffected

5.4.301 (semver)
unaffected

5.10.246 (semver)
unaffected

5.15.195 (semver)
unaffected

6.1.157 (semver)
unaffected

6.6.113 (semver)
unaffected

6.12.54 (semver)
unaffected

6.17.4 (semver)
unaffected

6.18 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/15ac9579ebdaf22a37d7f60b3a8efc1029732ef9

git.kernel.org/...c/bc26564bcc659beb6d977cd6eb394041ec2f2851

git.kernel.org/...c/ad4e8f9bdbef11a19b7cb93e7f313bf59bdcc3b4

git.kernel.org/...c/0a58d3e77b22b087a57831c87cafd360e144a5bd

git.kernel.org/...c/69a18ff6c60e8e113420f15355fad862cb45d38e

git.kernel.org/...c/ba63d4e9857a72a89e71a4eff9f2cc8c283e94c3

git.kernel.org/...c/57e4a6aadf12578b96a038373cffd54b3a58b092

git.kernel.org/...c/69e5d50fcf4093fb3f9f41c4f931f12c2ca8c467

cve.org (CVE-2025-40194)

nvd.nist.gov (CVE-2025-40194)

Download JSON