Home

Description

In the Linux kernel, the following vulnerability has been resolved: md: fix rcu protection in md_wakeup_thread We attempted to use RCU to protect the pointer 'thread', but directly passed the value when calling md_wakeup_thread(). This means that the RCU pointer has been acquired before rcu_read_lock(), which renders rcu_read_lock() ineffective and could lead to a use-after-free.

PUBLISHED Reserved 2025-12-16 | Published 2025-12-24 | Updated 2025-12-24 | Assigner Linux

Product status

Default status
unaffected

4469315439827290923fce4f3f672599cabeb366 (git) before 21989cb5034c835b212385a2afadf279d8069da0
affected

4469315439827290923fce4f3f672599cabeb366 (git) before a4bd1caf591faeae44cb10b6517e7dacb5139bda
affected

4469315439827290923fce4f3f672599cabeb366 (git) before f98b191f78124405294481dea85f8a22a3eb0a59
affected

4469315439827290923fce4f3f672599cabeb366 (git) before 0dc76205549b4c25705e54345f211b9f66e018a0
affected

Default status
affected

6.5
affected

Any version before 6.5
unaffected

6.12.63 (semver)
unaffected

6.17.13 (semver)
unaffected

6.18.2 (semver)
unaffected

6.19-rc1 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/21989cb5034c835b212385a2afadf279d8069da0

git.kernel.org/...c/a4bd1caf591faeae44cb10b6517e7dacb5139bda

git.kernel.org/...c/f98b191f78124405294481dea85f8a22a3eb0a59

git.kernel.org/...c/0dc76205549b4c25705e54345f211b9f66e018a0

cve.org (CVE-2025-68374)

nvd.nist.gov (CVE-2025-68374)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.