-
CVE-2025-38584
- EPSS 0.02%
- Veröffentlicht 19.08.2025 17:15:35
- Zuletzt bearbeitet 20.08.2025 14:40:17
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: padata: Fix pd UAF once and for all There is a race condition/UAF in padata_reorder that goes back to the initial commit. A reference count is taken at the start of the process in padata_do_parallel, and released at the end in padata_serial_worker. This reference count is (and only is) required for padata_replace to function correctly. If padata_replace is never called then there is no issue. In the function padata_reorder which serves as the core of padata, as soon as padata is added to queue->serial.list, and the associated spin lock released, that padata may be processed and the reference count on pd would go away. Fix this by getting the next padata before the squeue->serial lock is released. In order to make this possible, simplify padata_reorder by only calling it once the next padata arrives.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
dbe3e911a59bda6de96e7cae387ff882c2c177fa
Version
16295bec6398a3eedc9377e1af6ff4c71b98c300
Status
affected
Version <
cdf79bd2e1ecb3cc75631c73d8f4149be6019a52
Version
16295bec6398a3eedc9377e1af6ff4c71b98c300
Status
affected
Version <
71203f68c7749609d7fc8ae6ad054bdedeb24f91
Version
16295bec6398a3eedc9377e1af6ff4c71b98c300
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
2.6.34
Status
affected
Version <
2.6.34
Version
0
Status
unaffected
Version <=
6.15.*
Version
6.15.10
Status
unaffected
Version <=
6.16.*
Version
6.16.1
Status
unaffected
Version <=
*
Version
6.17-rc1
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.02% | 0.049 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|