In the Linux kernel, the following vulnerability has been resolved:
net: stmmac: Fix accessing freed irq affinity_hint
In stmmac_request_irq_multi_msi(), a pointer to the stack variable
cpu_mask is passed to irq_set_affinity_hint(). This value is stored in
irq_desc->affinity_hint, but once stmmac_request_irq_multi_msi()
returns, the pointer becomes dangling.
The affinity_hint is exposed via procfs with S_IRUGO permissions,
allowing any unprivileged process to read it. Accessing this stale
pointer can lead to:
- a kernel oops or panic if the referenced memory has been released and
unmapped, or
- leakage of kernel data into userspace if the memory is re-used for
other purposes.
All platforms that use stmmac with PCI MSI (Intel, Loongson, etc) are
affected.
References
Configurations
Configuration 1 (hide)
|
History
05 Nov 2025, 15:31
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | NVD-CWE-Other | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| First Time |
Linux
Linux linux Kernel |
|
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| References | () https://git.kernel.org/stable/c/442312c2a90d60c7a5197246583fa91d9e579985 - Patch | |
| References | () https://git.kernel.org/stable/c/9e51a6a44e2c4de780a26e8fe110d708e806a8cd - Patch | |
| References | () https://git.kernel.org/stable/c/c60d101a226f18e9a8f01bb4c6ca2b47dfcb15ef - Patch | |
| References | () https://git.kernel.org/stable/c/e148266e104fce396ad624079a6812ac3a9982ef - Patch |
29 Sep 2025, 11:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | (en) In the Linux kernel, the following vulnerability has been resolved: net: stmmac: Fix accessing freed irq affinity_hint In stmmac_request_irq_multi_msi(), a pointer to the stack variable cpu_mask is passed to irq_set_affinity_hint(). This value is stored in irq_desc->affinity_hint, but once stmmac_request_irq_multi_msi() returns, the pointer becomes dangling. The affinity_hint is exposed via procfs with S_IRUGO permissions, allowing any unprivileged process to read it. Accessing this stale pointer can lead to: - a kernel oops or panic if the referenced memory has been released and unmapped, or - leakage of kernel data into userspace if the memory is re-used for other purposes. All platforms that use stmmac with PCI MSI (Intel, Loongson, etc) are affected. |
06 Jul 2025, 10:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| Summary |
|
01 May 2025, 13:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-05-01 13:15
Updated : 2025-11-05 15:31
NVD link : CVE-2025-23155
Mitre link : CVE-2025-23155
CVE.ORG link : CVE-2025-23155
JSON object : View
Products Affected
linux
- linux_kernel
CWE
