First published: Thu Feb 27 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: workqueue: Put the pwq after detaching the rescuer from the pool The commit 68f83057b913("workqueue: Reap workers via kthread_stop() and remove detach_completion") adds code to reap the normal workers but mistakenly does not handle the rescuer and also removes the code waiting for the rescuer in put_unbound_pool(), which caused a use-after-free bug reported by Cheung Wall. To avoid the use-after-free bug, the pool’s reference must be held until the detachment is complete. Therefore, move the code that puts the pwq after detaching the rescuer from the pool.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
Linux Kernel | <6.12.16 | |
Linux Kernel | >=6.13<6.13.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2025-21786 is categorized as medium, highlighting a potential impact on system stability.
CVE-2025-21786 affects the Linux kernel, specifically versions prior to the fix implemented in the related commits.
To fix CVE-2025-21786, update your Linux kernel to the latest version that contains the necessary patches.
Mitigation strategies for CVE-2025-21786 include applying kernel patches and avoiding the use of affected kernel configurations.
Yes, patches for CVE-2025-21786 were released in the kernel commits that address the vulnerability.