CVE-2025-39996 (GCVE-0-2025-39996)
Vulnerability from cvelistv5
Published
2025-10-15 07:58
Modified
2025-10-15 10:22
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: media: b2c2: Fix use-after-free causing by irq_check_work in flexcop_pci_remove The original code uses cancel_delayed_work() in flexcop_pci_remove(), which does not guarantee that the delayed work item irq_check_work has fully completed if it was already running. This leads to use-after-free scenarios where flexcop_pci_remove() may free the flexcop_device while irq_check_work is still active and attempts to dereference the device. A typical race condition is illustrated below: CPU 0 (remove) | CPU 1 (delayed work callback) flexcop_pci_remove() | flexcop_pci_irq_check_work() cancel_delayed_work() | flexcop_device_kfree(fc_pci->fc_dev) | | fc = fc_pci->fc_dev; // UAF This is confirmed by a KASAN report: ================================================================== BUG: KASAN: slab-use-after-free in __run_timer_base.part.0+0x7d7/0x8c0 Write of size 8 at addr ffff8880093aa8c8 by task bash/135 ... Call Trace: <IRQ> dump_stack_lvl+0x55/0x70 print_report+0xcf/0x610 ? __run_timer_base.part.0+0x7d7/0x8c0 kasan_report+0xb8/0xf0 ? __run_timer_base.part.0+0x7d7/0x8c0 __run_timer_base.part.0+0x7d7/0x8c0 ? __pfx___run_timer_base.part.0+0x10/0x10 ? __pfx_read_tsc+0x10/0x10 ? ktime_get+0x60/0x140 ? lapic_next_event+0x11/0x20 ? clockevents_program_event+0x1d4/0x2a0 run_timer_softirq+0xd1/0x190 handle_softirqs+0x16a/0x550 irq_exit_rcu+0xaf/0xe0 sysvec_apic_timer_interrupt+0x70/0x80 </IRQ> ... Allocated by task 1: kasan_save_stack+0x24/0x50 kasan_save_track+0x14/0x30 __kasan_kmalloc+0x7f/0x90 __kmalloc_noprof+0x1be/0x460 flexcop_device_kmalloc+0x54/0xe0 flexcop_pci_probe+0x1f/0x9d0 local_pci_probe+0xdc/0x190 pci_device_probe+0x2fe/0x470 really_probe+0x1ca/0x5c0 __driver_probe_device+0x248/0x310 driver_probe_device+0x44/0x120 __driver_attach+0xd2/0x310 bus_for_each_dev+0xed/0x170 bus_add_driver+0x208/0x500 driver_register+0x132/0x460 do_one_initcall+0x89/0x300 kernel_init_freeable+0x40d/0x720 kernel_init+0x1a/0x150 ret_from_fork+0x10c/0x1a0 ret_from_fork_asm+0x1a/0x30 Freed by task 135: kasan_save_stack+0x24/0x50 kasan_save_track+0x14/0x30 kasan_save_free_info+0x3a/0x60 __kasan_slab_free+0x3f/0x50 kfree+0x137/0x370 flexcop_device_kfree+0x32/0x50 pci_device_remove+0xa6/0x1d0 device_release_driver_internal+0xf8/0x210 pci_stop_bus_device+0x105/0x150 pci_stop_and_remove_bus_device_locked+0x15/0x30 remove_store+0xcc/0xe0 kernfs_fop_write_iter+0x2c3/0x440 vfs_write+0x871/0xd70 ksys_write+0xee/0x1c0 do_syscall_64+0xac/0x280 entry_SYSCALL_64_after_hwframe+0x77/0x7f ... Replace cancel_delayed_work() with cancel_delayed_work_sync() to ensure that the delayed work item is properly canceled and any executing delayed work has finished before the device memory is deallocated. This bug was initially identified through static analysis. To reproduce and test it, I simulated the B2C2 FlexCop PCI device in QEMU and introduced artificial delays within the flexcop_pci_irq_check_work() function to increase the likelihood of triggering the bug.
Impacted products
Vendor Product Version
Linux Linux Version: 382c5546d618f24dc7d6ae7ca33412083720efbf
Version: 382c5546d618f24dc7d6ae7ca33412083720efbf
Version: 382c5546d618f24dc7d6ae7ca33412083720efbf
Version: 382c5546d618f24dc7d6ae7ca33412083720efbf
Version: 382c5546d618f24dc7d6ae7ca33412083720efbf
Version: 382c5546d618f24dc7d6ae7ca33412083720efbf
Create a notification for this product.
   Linux Linux Version: 2.6.29
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/media/pci/b2c2/flexcop-pci.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "d502df8a716d993fa0f9d8c00684f1190750e28e",
              "status": "affected",
              "version": "382c5546d618f24dc7d6ae7ca33412083720efbf",
              "versionType": "git"
            },
            {
              "lessThan": "bb10a9ddc8d6c5dbf098f21eb1055a652652e524",
              "status": "affected",
              "version": "382c5546d618f24dc7d6ae7ca33412083720efbf",
              "versionType": "git"
            },
            {
              "lessThan": "514a519baa9e2be7ddc2714bd730bc5a883e1244",
              "status": "affected",
              "version": "382c5546d618f24dc7d6ae7ca33412083720efbf",
              "versionType": "git"
            },
            {
              "lessThan": "3ffabc79388e68877d9c02f724a0b7a38d519daf",
              "status": "affected",
              "version": "382c5546d618f24dc7d6ae7ca33412083720efbf",
              "versionType": "git"
            },
            {
              "lessThan": "6a92f5796880f5aa345f0fed53ef511e3fd6f706",
              "status": "affected",
              "version": "382c5546d618f24dc7d6ae7ca33412083720efbf",
              "versionType": "git"
            },
            {
              "lessThan": "01e03fb7db419d39e18d6090d4873c1bff103914",
              "status": "affected",
              "version": "382c5546d618f24dc7d6ae7ca33412083720efbf",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/media/pci/b2c2/flexcop-pci.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "2.6.29"
            },
            {
              "lessThan": "2.6.29",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.156",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.110",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.12.*",
              "status": "unaffected",
              "version": "6.12.51",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.16.*",
              "status": "unaffected",
              "version": "6.16.11",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.17.*",
              "status": "unaffected",
              "version": "6.17.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.18-rc1",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.156",
                  "versionStartIncluding": "2.6.29",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.6.110",
                  "versionStartIncluding": "2.6.29",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.12.51",
                  "versionStartIncluding": "2.6.29",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.16.11",
                  "versionStartIncluding": "2.6.29",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.17.1",
                  "versionStartIncluding": "2.6.29",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.18-rc1",
                  "versionStartIncluding": "2.6.29",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: b2c2: Fix use-after-free causing by irq_check_work in flexcop_pci_remove\n\nThe original code uses cancel_delayed_work() in flexcop_pci_remove(), which\ndoes not guarantee that the delayed work item irq_check_work has fully\ncompleted if it was already running. This leads to use-after-free scenarios\nwhere flexcop_pci_remove() may free the flexcop_device while irq_check_work\nis still active and attempts to dereference the device.\n\nA typical race condition is illustrated below:\n\nCPU 0 (remove)                         | CPU 1 (delayed work callback)\nflexcop_pci_remove()                   | flexcop_pci_irq_check_work()\n  cancel_delayed_work()                |\n  flexcop_device_kfree(fc_pci-\u003efc_dev) |\n                                       |   fc = fc_pci-\u003efc_dev; // UAF\n\nThis is confirmed by a KASAN report:\n\n==================================================================\nBUG: KASAN: slab-use-after-free in __run_timer_base.part.0+0x7d7/0x8c0\nWrite of size 8 at addr ffff8880093aa8c8 by task bash/135\n...\nCall Trace:\n \u003cIRQ\u003e\n dump_stack_lvl+0x55/0x70\n print_report+0xcf/0x610\n ? __run_timer_base.part.0+0x7d7/0x8c0\n kasan_report+0xb8/0xf0\n ? __run_timer_base.part.0+0x7d7/0x8c0\n __run_timer_base.part.0+0x7d7/0x8c0\n ? __pfx___run_timer_base.part.0+0x10/0x10\n ? __pfx_read_tsc+0x10/0x10\n ? ktime_get+0x60/0x140\n ? lapic_next_event+0x11/0x20\n ? clockevents_program_event+0x1d4/0x2a0\n run_timer_softirq+0xd1/0x190\n handle_softirqs+0x16a/0x550\n irq_exit_rcu+0xaf/0xe0\n sysvec_apic_timer_interrupt+0x70/0x80\n \u003c/IRQ\u003e\n...\n\nAllocated by task 1:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n __kasan_kmalloc+0x7f/0x90\n __kmalloc_noprof+0x1be/0x460\n flexcop_device_kmalloc+0x54/0xe0\n flexcop_pci_probe+0x1f/0x9d0\n local_pci_probe+0xdc/0x190\n pci_device_probe+0x2fe/0x470\n really_probe+0x1ca/0x5c0\n __driver_probe_device+0x248/0x310\n driver_probe_device+0x44/0x120\n __driver_attach+0xd2/0x310\n bus_for_each_dev+0xed/0x170\n bus_add_driver+0x208/0x500\n driver_register+0x132/0x460\n do_one_initcall+0x89/0x300\n kernel_init_freeable+0x40d/0x720\n kernel_init+0x1a/0x150\n ret_from_fork+0x10c/0x1a0\n ret_from_fork_asm+0x1a/0x30\n\nFreed by task 135:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n kasan_save_free_info+0x3a/0x60\n __kasan_slab_free+0x3f/0x50\n kfree+0x137/0x370\n flexcop_device_kfree+0x32/0x50\n pci_device_remove+0xa6/0x1d0\n device_release_driver_internal+0xf8/0x210\n pci_stop_bus_device+0x105/0x150\n pci_stop_and_remove_bus_device_locked+0x15/0x30\n remove_store+0xcc/0xe0\n kernfs_fop_write_iter+0x2c3/0x440\n vfs_write+0x871/0xd70\n ksys_write+0xee/0x1c0\n do_syscall_64+0xac/0x280\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n...\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled and any executing delayed\nwork has finished before the device memory is deallocated.\n\nThis bug was initially identified through static analysis. To reproduce\nand test it, I simulated the B2C2 FlexCop PCI device in QEMU and introduced\nartificial delays within the flexcop_pci_irq_check_work() function to\nincrease the likelihood of triggering the bug."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-15T10:22:26.950Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/d502df8a716d993fa0f9d8c00684f1190750e28e"
        },
        {
          "url": "https://git.kernel.org/stable/c/bb10a9ddc8d6c5dbf098f21eb1055a652652e524"
        },
        {
          "url": "https://git.kernel.org/stable/c/514a519baa9e2be7ddc2714bd730bc5a883e1244"
        },
        {
          "url": "https://git.kernel.org/stable/c/3ffabc79388e68877d9c02f724a0b7a38d519daf"
        },
        {
          "url": "https://git.kernel.org/stable/c/6a92f5796880f5aa345f0fed53ef511e3fd6f706"
        },
        {
          "url": "https://git.kernel.org/stable/c/01e03fb7db419d39e18d6090d4873c1bff103914"
        }
      ],
      "title": "media: b2c2: Fix use-after-free causing by irq_check_work in flexcop_pci_remove",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2025-39996",
    "datePublished": "2025-10-15T07:58:21.049Z",
    "dateReserved": "2025-04-16T07:20:57.151Z",
    "dateUpdated": "2025-10-15T10:22:26.950Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2025-39996\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-10-15T08:15:37.817\",\"lastModified\":\"2025-10-16T15:28:59.610\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nmedia: b2c2: Fix use-after-free causing by irq_check_work in flexcop_pci_remove\\n\\nThe original code uses cancel_delayed_work() in flexcop_pci_remove(), which\\ndoes not guarantee that the delayed work item irq_check_work has fully\\ncompleted if it was already running. This leads to use-after-free scenarios\\nwhere flexcop_pci_remove() may free the flexcop_device while irq_check_work\\nis still active and attempts to dereference the device.\\n\\nA typical race condition is illustrated below:\\n\\nCPU 0 (remove)                         | CPU 1 (delayed work callback)\\nflexcop_pci_remove()                   | flexcop_pci_irq_check_work()\\n  cancel_delayed_work()                |\\n  flexcop_device_kfree(fc_pci-\u003efc_dev) |\\n                                       |   fc = fc_pci-\u003efc_dev; // UAF\\n\\nThis is confirmed by a KASAN report:\\n\\n==================================================================\\nBUG: KASAN: slab-use-after-free in __run_timer_base.part.0+0x7d7/0x8c0\\nWrite of size 8 at addr ffff8880093aa8c8 by task bash/135\\n...\\nCall Trace:\\n \u003cIRQ\u003e\\n dump_stack_lvl+0x55/0x70\\n print_report+0xcf/0x610\\n ? __run_timer_base.part.0+0x7d7/0x8c0\\n kasan_report+0xb8/0xf0\\n ? __run_timer_base.part.0+0x7d7/0x8c0\\n __run_timer_base.part.0+0x7d7/0x8c0\\n ? __pfx___run_timer_base.part.0+0x10/0x10\\n ? __pfx_read_tsc+0x10/0x10\\n ? ktime_get+0x60/0x140\\n ? lapic_next_event+0x11/0x20\\n ? clockevents_program_event+0x1d4/0x2a0\\n run_timer_softirq+0xd1/0x190\\n handle_softirqs+0x16a/0x550\\n irq_exit_rcu+0xaf/0xe0\\n sysvec_apic_timer_interrupt+0x70/0x80\\n \u003c/IRQ\u003e\\n...\\n\\nAllocated by task 1:\\n kasan_save_stack+0x24/0x50\\n kasan_save_track+0x14/0x30\\n __kasan_kmalloc+0x7f/0x90\\n __kmalloc_noprof+0x1be/0x460\\n flexcop_device_kmalloc+0x54/0xe0\\n flexcop_pci_probe+0x1f/0x9d0\\n local_pci_probe+0xdc/0x190\\n pci_device_probe+0x2fe/0x470\\n really_probe+0x1ca/0x5c0\\n __driver_probe_device+0x248/0x310\\n driver_probe_device+0x44/0x120\\n __driver_attach+0xd2/0x310\\n bus_for_each_dev+0xed/0x170\\n bus_add_driver+0x208/0x500\\n driver_register+0x132/0x460\\n do_one_initcall+0x89/0x300\\n kernel_init_freeable+0x40d/0x720\\n kernel_init+0x1a/0x150\\n ret_from_fork+0x10c/0x1a0\\n ret_from_fork_asm+0x1a/0x30\\n\\nFreed by task 135:\\n kasan_save_stack+0x24/0x50\\n kasan_save_track+0x14/0x30\\n kasan_save_free_info+0x3a/0x60\\n __kasan_slab_free+0x3f/0x50\\n kfree+0x137/0x370\\n flexcop_device_kfree+0x32/0x50\\n pci_device_remove+0xa6/0x1d0\\n device_release_driver_internal+0xf8/0x210\\n pci_stop_bus_device+0x105/0x150\\n pci_stop_and_remove_bus_device_locked+0x15/0x30\\n remove_store+0xcc/0xe0\\n kernfs_fop_write_iter+0x2c3/0x440\\n vfs_write+0x871/0xd70\\n ksys_write+0xee/0x1c0\\n do_syscall_64+0xac/0x280\\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\\n...\\n\\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\\nthat the delayed work item is properly canceled and any executing delayed\\nwork has finished before the device memory is deallocated.\\n\\nThis bug was initially identified through static analysis. To reproduce\\nand test it, I simulated the B2C2 FlexCop PCI device in QEMU and introduced\\nartificial delays within the flexcop_pci_irq_check_work() function to\\nincrease the likelihood of triggering the bug.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/01e03fb7db419d39e18d6090d4873c1bff103914\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/3ffabc79388e68877d9c02f724a0b7a38d519daf\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/514a519baa9e2be7ddc2714bd730bc5a883e1244\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/6a92f5796880f5aa345f0fed53ef511e3fd6f706\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/bb10a9ddc8d6c5dbf098f21eb1055a652652e524\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/d502df8a716d993fa0f9d8c00684f1190750e28e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…