CVE-2025-22126 (GCVE-0-2025-22126)
Vulnerability from cvelistv5
Published
2025-04-16 14:13
Modified
2025-04-25 10:06
Severity ?
EPSS score ?
Summary
In the Linux kernel, the following vulnerability has been resolved:
md: fix mddev uaf while iterating all_mddevs list
While iterating all_mddevs list from md_notify_reboot() and md_exit(),
list_for_each_entry_safe is used, and this can race with deletint the
next mddev, causing UAF:
t1:
spin_lock
//list_for_each_entry_safe(mddev, n, ...)
mddev_get(mddev1)
// assume mddev2 is the next entry
spin_unlock
t2:
//remove mddev2
...
mddev_free
spin_lock
list_del
spin_unlock
kfree(mddev2)
mddev_put(mddev1)
spin_lock
//continue dereference mddev2->all_mddevs
The old helper for_each_mddev() actually grab the reference of mddev2
while holding the lock, to prevent from being freed. This problem can be
fixed the same way, however, the code will be complex.
Hence switch to use list_for_each_entry, in this case mddev_put() can free
the mddev1 and it's not safe as well. Refer to md_seq_show(), also factor
out a helper mddev_put_locked() to fix this problem.
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| ▼ | Linux | Linux |
Version: f26514342255855f4ca3c0a92cb1cdea01c33004 Version: f26514342255855f4ca3c0a92cb1cdea01c33004 Version: f26514342255855f4ca3c0a92cb1cdea01c33004 Version: f26514342255855f4ca3c0a92cb1cdea01c33004 Version: f26514342255855f4ca3c0a92cb1cdea01c33004 |
||||||
|
|||||||||
{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"drivers/md/md.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "ca9f84de76723b358dfc0606668efdca54afc2e5",
"status": "affected",
"version": "f26514342255855f4ca3c0a92cb1cdea01c33004",
"versionType": "git"
},
{
"lessThan": "d69a23d8e925f8052d657652a6875ec2712c7e33",
"status": "affected",
"version": "f26514342255855f4ca3c0a92cb1cdea01c33004",
"versionType": "git"
},
{
"lessThan": "e2a9f73ee408a460f4c9dfe03b4741d6b11652b8",
"status": "affected",
"version": "f26514342255855f4ca3c0a92cb1cdea01c33004",
"versionType": "git"
},
{
"lessThan": "5462544ccbad3fc938a71b01fa5bd3a0dc2b750a",
"status": "affected",
"version": "f26514342255855f4ca3c0a92cb1cdea01c33004",
"versionType": "git"
},
{
"lessThan": "8542870237c3a48ff049b6c5df5f50c8728284fa",
"status": "affected",
"version": "f26514342255855f4ca3c0a92cb1cdea01c33004",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"drivers/md/md.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "6.0"
},
{
"lessThan": "6.0",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.1.*",
"status": "unaffected",
"version": "6.1.135",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.6.*",
"status": "unaffected",
"version": "6.6.88",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.12.*",
"status": "unaffected",
"version": "6.12.25",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.14.*",
"status": "unaffected",
"version": "6.14.2",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "6.15-rc1",
"versionType": "original_commit_for_fix"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd: fix mddev uaf while iterating all_mddevs list\n\nWhile iterating all_mddevs list from md_notify_reboot() and md_exit(),\nlist_for_each_entry_safe is used, and this can race with deletint the\nnext mddev, causing UAF:\n\nt1:\nspin_lock\n//list_for_each_entry_safe(mddev, n, ...)\n mddev_get(mddev1)\n // assume mddev2 is the next entry\n spin_unlock\n t2:\n //remove mddev2\n ...\n mddev_free\n spin_lock\n list_del\n spin_unlock\n kfree(mddev2)\n mddev_put(mddev1)\n spin_lock\n //continue dereference mddev2-\u003eall_mddevs\n\nThe old helper for_each_mddev() actually grab the reference of mddev2\nwhile holding the lock, to prevent from being freed. This problem can be\nfixed the same way, however, the code will be complex.\n\nHence switch to use list_for_each_entry, in this case mddev_put() can free\nthe mddev1 and it\u0027s not safe as well. Refer to md_seq_show(), also factor\nout a helper mddev_put_locked() to fix this problem."
}
],
"providerMetadata": {
"dateUpdated": "2025-04-25T10:06:48.152Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/ca9f84de76723b358dfc0606668efdca54afc2e5"
},
{
"url": "https://git.kernel.org/stable/c/d69a23d8e925f8052d657652a6875ec2712c7e33"
},
{
"url": "https://git.kernel.org/stable/c/e2a9f73ee408a460f4c9dfe03b4741d6b11652b8"
},
{
"url": "https://git.kernel.org/stable/c/5462544ccbad3fc938a71b01fa5bd3a0dc2b750a"
},
{
"url": "https://git.kernel.org/stable/c/8542870237c3a48ff049b6c5df5f50c8728284fa"
}
],
"title": "md: fix mddev uaf while iterating all_mddevs list",
"x_generator": {
"engine": "bippy-1.1.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2025-22126",
"datePublished": "2025-04-16T14:13:09.399Z",
"dateReserved": "2024-12-29T08:45:45.823Z",
"dateUpdated": "2025-04-25T10:06:48.152Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-22126\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-04-16T15:16:06.727\",\"lastModified\":\"2025-04-17T20:22:16.240\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nmd: fix mddev uaf while iterating all_mddevs list\\n\\nWhile iterating all_mddevs list from md_notify_reboot() and md_exit(),\\nlist_for_each_entry_safe is used, and this can race with deletint the\\nnext mddev, causing UAF:\\n\\nt1:\\nspin_lock\\n//list_for_each_entry_safe(mddev, n, ...)\\n mddev_get(mddev1)\\n // assume mddev2 is the next entry\\n spin_unlock\\n t2:\\n //remove mddev2\\n ...\\n mddev_free\\n spin_lock\\n list_del\\n spin_unlock\\n kfree(mddev2)\\n mddev_put(mddev1)\\n spin_lock\\n //continue dereference mddev2-\u003eall_mddevs\\n\\nThe old helper for_each_mddev() actually grab the reference of mddev2\\nwhile holding the lock, to prevent from being freed. This problem can be\\nfixed the same way, however, the code will be complex.\\n\\nHence switch to use list_for_each_entry, in this case mddev_put() can free\\nthe mddev1 and it\u0027s not safe as well. Refer to md_seq_show(), also factor\\nout a helper mddev_put_locked() to fix this problem.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/5462544ccbad3fc938a71b01fa5bd3a0dc2b750a\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/8542870237c3a48ff049b6c5df5f50c8728284fa\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.