CVE-2025-38584
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
19/08/2025
Last modified:
26/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
padata: Fix pd UAF once and for all<br />
<br />
There is a race condition/UAF in padata_reorder that goes back<br />
to the initial commit. A reference count is taken at the start<br />
of the process in padata_do_parallel, and released at the end in<br />
padata_serial_worker.<br />
<br />
This reference count is (and only is) required for padata_replace<br />
to function correctly. If padata_replace is never called then<br />
there is no issue.<br />
<br />
In the function padata_reorder which serves as the core of padata,<br />
as soon as padata is added to queue->serial.list, and the associated<br />
spin lock released, that padata may be processed and the reference<br />
count on pd would go away.<br />
<br />
Fix this by getting the next padata before the squeue->serial lock<br />
is released.<br />
<br />
In order to make this possible, simplify padata_reorder by only<br />
calling it once the next padata arrives.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.34 (including) | 6.15.10 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.16 (including) | 6.16.1 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



