In the Linux kernel, the following vulnerability has been resolved:
padata: avoid UAF for reorder_work
Although the previous patch can avoid ps and ps UAF for _do_serial, it
can not avoid potential UAF issue for reorder_work. This issue can
happen just as below:
crypto_request crypto_request crypto_del_alg
padata_do_serial
...
padata_reorder
// processes all remaining
// requests then breaks
while (1) {
if (!padata)
break;
...
}
padata_do_serial
// new request added
list_add
// sees the new request
queue_work(reorder_work)
padata_reorder
queue_work_on(squeue->work)
...
<kworker context>
padata_serial_worker
// completes new request,
// no more outstanding
// requests
crypto_del_alg
// free pd
<kworker context>
invoke_padata_reorder
// UAF of pd
To avoid UAF for 'reorder_work', get 'pd' ref before put 'reorder_work'
into the 'serial_wq' and put 'pd' ref until the 'serial_wq' finish.
References
Configurations
Configuration 1 (hide)
|
History
24 Mar 2025, 18:58
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
First Time |
Linux linux Kernel
Linux |
|
References | () https://git.kernel.org/stable/c/4c6209efea2208597dbd3e52dc87a0d1a8f2dbe1 - Patch | |
References | () https://git.kernel.org/stable/c/6f45ef616775b0ce7889b0f6077fc8d681ab30bc - Patch | |
References | () https://git.kernel.org/stable/c/7000507bb0d2ceb545c0a690e0c707c897d102c2 - Patch | |
References | () https://git.kernel.org/stable/c/8ca38d0ca8c3d30dd18d311f1a7ec5cb56972cac - Patch | |
References | () https://git.kernel.org/stable/c/a54091c24220a4cd847d5b4f36d678edacddbaf0 - Patch | |
References | () https://git.kernel.org/stable/c/dd7d37ccf6b11f3d95e797ebe4e9e886d0332600 - Patch | |
References | () https://git.kernel.org/stable/c/f4f1b1169fc3694f9bc3e28c6c68dbbf4cc744c0 - Patch |
13 Mar 2025, 13:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References |
|
27 Feb 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-416 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
27 Feb 2025, 02:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-27 02:15
Updated : 2025-03-24 18:58
NVD link : CVE-2025-21726
Mitre link : CVE-2025-21726
CVE.ORG link : CVE-2025-21726
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free