First published: Wed Apr 16 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: exfat: fix random stack corruption after get_block When get_block is called with a buffer_head allocated on the stack, such as do_mpage_readpage, stack corruption due to buffer_head UAF may occur in the following race condition situation. <CPU 0> <CPU 1> mpage_read_folio <<bh on stack>> do_mpage_readpage exfat_get_block bh_read __bh_read get_bh(bh) submit_bh wait_on_buffer ... end_buffer_read_sync __end_buffer_read_notouch unlock_buffer <<keep going>> ... ... ... ... <<bh is not valid out of mpage_read_folio>> . . another_function <<variable A on stack>> put_bh(bh) atomic_dec(bh->b_count) * stack corruption here * This patch returns -EAGAIN if a folio does not have buffers when bh_read needs to be called. By doing this, the caller can fallback to functions like block_read_full_folio(), create a buffer_head in the folio, and then call get_block again. Let's do not call bh_read() with on-stack buffer_head.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
Linux Kernel | >=6.8<6.12.23 | |
Linux Kernel | >=6.13<6.13.11 | |
Linux Kernel | >=6.14<6.14.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-22036 has been classified as a high-severity vulnerability due to the potential for stack corruption and exploitation.
To mitigate CVE-2025-22036, it is recommended to update the Linux kernel to a version where the vulnerability has been patched.
CVE-2025-22036 affects Linux kernel versions from 6.8 to 6.12.23, 6.13 to 6.13.11, and 6.14 to 6.14.2.
Exploitation of CVE-2025-22036 can lead to possible stack corruption, resulting in system instability or crashes.
System administrators and users running affected versions of the Linux kernel should prioritize addressing CVE-2025-22036.