CVE-2025-38584

In the Linux kernel, the following vulnerability has been resolved: padata: Fix pd UAF once and for all There is a race condition/UAF in padata_reorder that goes back to the initial commit. A reference count is taken at the start of the process in padata_do_parallel, and released at the end in padata_serial_worker. This reference count is (and only is) required for padata_replace to function correctly. If padata_replace is never called then there is no issue. In the function padata_reorder which serves as the core of padata, as soon as padata is added to queue->serial.list, and the associated spin lock released, that padata may be processed and the reference count on pd would go away. Fix this by getting the next padata before the squeue->serial lock is released. In order to make this possible, simplify padata_reorder by only calling it once the next padata arrives.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

26 Nov 2025, 17:57

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE CWE-416
References () https://git.kernel.org/stable/c/71203f68c7749609d7fc8ae6ad054bdedeb24f91 - () https://git.kernel.org/stable/c/71203f68c7749609d7fc8ae6ad054bdedeb24f91 - Patch
References () https://git.kernel.org/stable/c/cdf79bd2e1ecb3cc75631c73d8f4149be6019a52 - () https://git.kernel.org/stable/c/cdf79bd2e1ecb3cc75631c73d8f4149be6019a52 - Patch
References () https://git.kernel.org/stable/c/dbe3e911a59bda6de96e7cae387ff882c2c177fa - () https://git.kernel.org/stable/c/dbe3e911a59bda6de96e7cae387ff882c2c177fa - Patch

Information

Published : 2025-08-19 17:15

Updated : 2025-11-26 17:57


NVD link : CVE-2025-38584

Mitre link : CVE-2025-38584

CVE.ORG link : CVE-2025-38584


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free