First published: Thu Feb 27 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: padata: avoid UAF for reorder_work Although the previous patch can avoid ps and ps UAF for _do_serial, it can not avoid potential UAF issue for reorder_work. This issue can happen just as below: crypto_request crypto_request crypto_del_alg padata_do_serial ... padata_reorder // processes all remaining // requests then breaks while (1) { if (!padata) break; ... } padata_do_serial // new request added list_add // sees the new request queue_work(reorder_work) padata_reorder queue_work_on(squeue->work) ... <kworker context> padata_serial_worker // completes new request, // no more outstanding // requests crypto_del_alg // free pd <kworker context> invoke_padata_reorder // UAF of pd To avoid UAF for 'reorder_work', get 'pd' ref before put 'reorder_work' into the 'serial_wq' and put 'pd' ref until the 'serial_wq' finish.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
Linux Kernel | >=5.4.19<5.5 | |
Linux Kernel | >=5.5.3<5.10.235 | |
Linux Kernel | >=5.11<5.15.79 | |
Linux Kernel | >=5.16<6.1.129 | |
Linux Kernel | >=6.2<6.6.76 | |
Linux Kernel | >=6.7<6.12.13 | |
Linux Kernel | >=6.13<6.13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-21726 has a medium severity rating due to its potential to cause a use-after-free condition in the Linux kernel.
To fix CVE-2025-21726, ensure that you update to the latest version of the Linux kernel that includes the relevant patches.
CVE-2025-21726 affects all versions of the Linux kernel prior to the patched releases.
CVE-2025-21726 is a use-after-free vulnerability in the padata subsystem of the Linux kernel.
Exploitation of CVE-2025-21726 could potentially lead to arbitrary code execution or a system crash.