lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2025091141-CVE-2025-39749-1f58@gregkh>
Date: Thu, 11 Sep 2025 18:52:50 +0200
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...nel.org>
Subject: CVE-2025-39749: rcu: Protect ->defer_qs_iw_pending from data race

From: Greg Kroah-Hartman <gregkh@...nel.org>

Description
===========

In the Linux kernel, the following vulnerability has been resolved:

rcu: Protect ->defer_qs_iw_pending from data race

On kernels built with CONFIG_IRQ_WORK=y, when rcu_read_unlock() is
invoked within an interrupts-disabled region of code [1], it will invoke
rcu_read_unlock_special(), which uses an irq-work handler to force the
system to notice when the RCU read-side critical section actually ends.
That end won't happen until interrupts are enabled at the soonest.

In some kernels, such as those booted with rcutree.use_softirq=y, the
irq-work handler is used unconditionally.

The per-CPU rcu_data structure's ->defer_qs_iw_pending field is
updated by the irq-work handler and is both read and updated by
rcu_read_unlock_special().  This resulted in the following KCSAN splat:

------------------------------------------------------------------------

BUG: KCSAN: data-race in rcu_preempt_deferred_qs_handler / rcu_read_unlock_special

read to 0xffff96b95f42d8d8 of 1 bytes by task 90 on cpu 8:
 rcu_read_unlock_special+0x175/0x260
 __rcu_read_unlock+0x92/0xa0
 rt_spin_unlock+0x9b/0xc0
 __local_bh_enable+0x10d/0x170
 __local_bh_enable_ip+0xfb/0x150
 rcu_do_batch+0x595/0xc40
 rcu_cpu_kthread+0x4e9/0x830
 smpboot_thread_fn+0x24d/0x3b0
 kthread+0x3bd/0x410
 ret_from_fork+0x35/0x40
 ret_from_fork_asm+0x1a/0x30

write to 0xffff96b95f42d8d8 of 1 bytes by task 88 on cpu 8:
 rcu_preempt_deferred_qs_handler+0x1e/0x30
 irq_work_single+0xaf/0x160
 run_irq_workd+0x91/0xc0
 smpboot_thread_fn+0x24d/0x3b0
 kthread+0x3bd/0x410
 ret_from_fork+0x35/0x40
 ret_from_fork_asm+0x1a/0x30

no locks held by irq_work/8/88.
irq event stamp: 200272
hardirqs last  enabled at (200272): [<ffffffffb0f56121>] finish_task_switch+0x131/0x320
hardirqs last disabled at (200271): [<ffffffffb25c7859>] __schedule+0x129/0xd70
softirqs last  enabled at (0): [<ffffffffb0ee093f>] copy_process+0x4df/0x1cc0
softirqs last disabled at (0): [<0000000000000000>] 0x0

------------------------------------------------------------------------

The problem is that irq-work handlers run with interrupts enabled, which
means that rcu_preempt_deferred_qs_handler() could be interrupted,
and that interrupt handler might contain an RCU read-side critical
section, which might invoke rcu_read_unlock_special().  In the strict
KCSAN mode of operation used by RCU, this constitutes a data race on
the ->defer_qs_iw_pending field.

This commit therefore disables interrupts across the portion of the
rcu_preempt_deferred_qs_handler() that updates the ->defer_qs_iw_pending
field.  This suffices because this handler is not a fast path.

The Linux kernel CVE team has assigned CVE-2025-39749 to this issue.


Affected and fixed versions
===========================

	Fixed in 5.4.297 with commit 74f58f382a7c8333f8d09701aefaa25913bdbe0e
	Fixed in 5.10.241 with commit f937759c7432d6151b73e1393b6517661813d506
	Fixed in 5.15.190 with commit 0ad84d62217488e679ecc90e8628980dcc003de3
	Fixed in 6.1.149 with commit b5de8d80b5d049f051b95d9b1ee50ae4ab656124
	Fixed in 6.6.103 with commit b55947b725f190396f475d5d0c59aa855a4d8895
	Fixed in 6.12.43 with commit e35e711c78c8a4c43330c0dcb1c4d507a19c20f4
	Fixed in 6.15.11 with commit 90de9c94ea72327cfa9c2c9f6113c23a513af60b
	Fixed in 6.16.2 with commit 55e11f6776798b27cf09a7aa0d718415d4fc9cf5
	Fixed in 6.17-rc1 with commit 90c09d57caeca94e6f3f87c49e96a91edd40cbfd

Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.

Unaffected versions might change over time as fixes are backported to
older supported kernel versions.  The official CVE entry at
	https://cve.org/CVERecord/?id=CVE-2025-39749
will be updated if fixes are backported, please check that for the most
up to date information about this issue.


Affected files
==============

The file(s) affected by this issue are:
	kernel/rcu/tree_plugin.h


Mitigation
==========

The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes.  Individual
changes are never tested alone, but rather are part of a larger kernel
release.  Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all.  If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
	https://git.kernel.org/stable/c/74f58f382a7c8333f8d09701aefaa25913bdbe0e
	https://git.kernel.org/stable/c/f937759c7432d6151b73e1393b6517661813d506
	https://git.kernel.org/stable/c/0ad84d62217488e679ecc90e8628980dcc003de3
	https://git.kernel.org/stable/c/b5de8d80b5d049f051b95d9b1ee50ae4ab656124
	https://git.kernel.org/stable/c/b55947b725f190396f475d5d0c59aa855a4d8895
	https://git.kernel.org/stable/c/e35e711c78c8a4c43330c0dcb1c4d507a19c20f4
	https://git.kernel.org/stable/c/90de9c94ea72327cfa9c2c9f6113c23a513af60b
	https://git.kernel.org/stable/c/55e11f6776798b27cf09a7aa0d718415d4fc9cf5
	https://git.kernel.org/stable/c/90c09d57caeca94e6f3f87c49e96a91edd40cbfd

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ