CVE-2025-37805

In the Linux kernel, the following vulnerability has been resolved: sound/virtio: Fix cancel_sync warnings on uninitialized work_structs Betty reported hitting the following warning: [ 8.709131][ T221] WARNING: CPU: 2 PID: 221 at kernel/workqueue.c:4182 ... [ 8.713282][ T221] Call trace: [ 8.713365][ T221] __flush_work+0x8d0/0x914 [ 8.713468][ T221] __cancel_work_sync+0xac/0xfc [ 8.713570][ T221] cancel_work_sync+0x24/0x34 [ 8.713667][ T221] virtsnd_remove+0xa8/0xf8 [virtio_snd ab15f34d0dd772f6d11327e08a81d46dc9c36276] [ 8.713868][ T221] virtsnd_probe+0x48c/0x664 [virtio_snd ab15f34d0dd772f6d11327e08a81d46dc9c36276] [ 8.714035][ T221] virtio_dev_probe+0x28c/0x390 [ 8.714139][ T221] really_probe+0x1bc/0x4c8 ... It seems we're hitting the error path in virtsnd_probe(), which triggers a virtsnd_remove() which iterates over the substreams calling cancel_work_sync() on the elapsed_period work_struct. Looking at the code, from earlier in: virtsnd_probe()->virtsnd_build_devs()->virtsnd_pcm_parse_cfg() We set snd->nsubstreams, allocate the snd->substreams, and if we then hit an error on the info allocation or something in virtsnd_ctl_query_info() fails, we will exit without having initialized the elapsed_period work_struct. When that error path unwinds we then call virtsnd_remove() which as long as the substreams array is allocated, will iterate through calling cancel_work_sync() on the uninitialized work struct hitting this warning. Takashi Iwai suggested this fix, which initializes the substreams structure right after allocation, so that if we hit the error paths we avoid trying to cleanup uninitialized data. Note: I have not yet managed to reproduce the issue myself, so this patch has had limited testing. Feedback or thoughts would be appreciated!
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

05 Jun 2025, 14:31

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-770
References () https://git.kernel.org/stable/c/3c7df2e27346eb40a0e86230db1ccab195c97cfe - () https://git.kernel.org/stable/c/3c7df2e27346eb40a0e86230db1ccab195c97cfe - Patch
References () https://git.kernel.org/stable/c/54c7b864fbe4423a07b443a4ada0106052942116 - () https://git.kernel.org/stable/c/54c7b864fbe4423a07b443a4ada0106052942116 - Patch
References () https://git.kernel.org/stable/c/5be9407b41eae20eef9140f5cfbfcbc3d01aaf45 - () https://git.kernel.org/stable/c/5be9407b41eae20eef9140f5cfbfcbc3d01aaf45 - Patch
References () https://git.kernel.org/stable/c/66046b586c0aaa9332483bcdbd76e3305d6138e9 - () https://git.kernel.org/stable/c/66046b586c0aaa9332483bcdbd76e3305d6138e9 - Patch
References () https://git.kernel.org/stable/c/9908498ce929a5a052b79bb7942f9ea317312ce4 - () https://git.kernel.org/stable/c/9908498ce929a5a052b79bb7942f9ea317312ce4 - Patch
References () https://git.kernel.org/stable/c/e03b10c45c7675b6098190c6e7de1b656d8bcdbe - () https://git.kernel.org/stable/c/e03b10c45c7675b6098190c6e7de1b656d8bcdbe - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux linux Kernel
Linux

08 May 2025, 14:39

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: sound/virtio: Se corrigen las advertencias de cancel_sync en work_structs no inicializados Betty informó haber recibido la siguiente advertencia: [ 8.709131][ T221] ADVERTENCIA: CPU: 2 PID: 221 en kernel/workqueue.c:4182 ... [ 8.713282][ T221] Rastreo de llamadas: [ 8.713365][ T221] __flush_work+0x8d0/0x914 [ 8.713468][ T221] __cancel_work_sync+0xac/0xfc [ 8.713570][ T221] cancel_work_sync+0x24/0x34 [ 8.713667][ T221] virtsnd_remove+0xa8/0xf8 [virtio_snd ab15f34d0dd772f6d11327e08a81d46dc9c36276] [ 8.713868][ T221] virtsnd_probe+0x48c/0x664 [virtio_snd ab15f34d0dd772f6d11327e08a81d46dc9c36276] [ 8.714035][ T221] virtio_dev_probe+0x28c/0x390 [ 8.714139][ T221] really_probe+0x1bc/0x4c8 ... Parece que estamos llegando a la ruta de error en virtsnd_probe(), que activa un virtsnd_remove() que itera sobre los subflujos que llaman a cancel_work_sync() en el elapsed_period work_struct. Mirando el código anterior: virtsnd_probe()->virtsnd_build_devs()->virtsnd_pcm_parse_cfg() Establecemos snd->nsubstreams, asignamos los snd->substreams y, si encontramos un error en la asignación de información o algo en virtsnd_ctl_query_info() falla, saldremos sin haber inicializado el work_struct elapsed_period. Cuando se deshaga esa ruta de error, llamamos a virtsnd_remove() que, mientras la matriz de substreams esté asignada, iterará llamando a cancel_work_sync() en la estructura de trabajo no inicializada que encuentre esta advertencia. Takashi Iwai sugirió esta solución, que inicializa la estructura de substreams justo después de la asignación, de modo que, si encontramos las rutas de error, evitamos intentar limpiar los datos no inicializados. Nota: Todavía no he logrado reproducir el problema yo mismo, por lo que este parche ha tenido pruebas limitadas. ¡Se agradecerían sus comentarios o ideas!

08 May 2025, 07:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-08 07:15

Updated : 2025-06-05 14:31


NVD link : CVE-2025-37805

Mitre link : CVE-2025-37805

CVE.ORG link : CVE-2025-37805


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-770

Allocation of Resources Without Limits or Throttling