CVE-2025-68373
Unknown Unknown - Not Provided
Use-After-Free Race Condition in Linux Kernel md Component

Publication date: 2025-12-24

Last updated on: 2025-12-24

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: md: avoid repeated calls to del_gendisk There is a uaf problem which is found by case 23rdev-lifetime: Oops: general protection fault, probably for non-canonical address 0xdead000000000122 RIP: 0010:bdi_unregister+0x4b/0x170 Call Trace: <TASK> __del_gendisk+0x356/0x3e0 mddev_unlock+0x351/0x360 rdev_attr_store+0x217/0x280 kernfs_fop_write_iter+0x14a/0x210 vfs_write+0x29e/0x550 ksys_write+0x74/0xf0 do_syscall_64+0xbb/0x380 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7ff5250a177e The sequence is: 1. rdev remove path gets reconfig_mutex 2. rdev remove path release reconfig_mutex in mddev_unlock 3. md stop calls do_md_stop and sets MD_DELETED 4. rdev remove path calls del_gendisk because MD_DELETED is set 5. md stop path release reconfig_mutex and calls del_gendisk again So there is a race condition we should resolve. This patch adds a flag MD_DO_DELETE to avoid the race condition.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-24
Last Modified
2025-12-24
Generated
2026-05-06
AI Q&A
2025-12-24
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a use-after-free (uaf) problem in the Linux kernel's md (multiple device) subsystem caused by repeated calls to the function del_gendisk. A race condition occurs when two paths (rdev remove path and md stop path) both call del_gendisk due to improper synchronization, leading to a general protection fault. The issue arises because the md stop path sets a flag MD_DELETED and calls del_gendisk, and then the rdev remove path also calls del_gendisk again, causing the use-after-free. The patch adds a flag MD_DO_DELETE to prevent this race condition.


How can this vulnerability impact me? :

This vulnerability can cause a system crash (general protection fault) due to a use-after-free error in the Linux kernel's md subsystem. This can lead to instability, potential denial of service, and unexpected behavior in systems using the affected kernel, impacting system reliability and availability.


What immediate steps should I take to mitigate this vulnerability?

Apply the patch that adds the MD_DO_DELETE flag to avoid the race condition causing the use-after-free. This involves updating the Linux kernel to the fixed version where this issue is resolved.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart