- Description
 - In the Linux kernel, the following vulnerability has been resolved: padata: fix UAF in padata_reorder A bug was found when run ltp test: BUG: KASAN: slab-use-after-free in padata_find_next+0x29/0x1a0 Read of size 4 at addr ffff88bbfe003524 by task kworker/u113:2/3039206 CPU: 0 PID: 3039206 Comm: kworker/u113:2 Kdump: loaded Not tainted 6.6.0+ Workqueue: pdecrypt_parallel padata_parallel_worker Call Trace: <TASK> dump_stack_lvl+0x32/0x50 print_address_description.constprop.0+0x6b/0x3d0 print_report+0xdd/0x2c0 kasan_report+0xa5/0xd0 padata_find_next+0x29/0x1a0 padata_reorder+0x131/0x220 padata_parallel_worker+0x3d/0xc0 process_one_work+0x2ec/0x5a0 If 'mdelay(10)' is added before calling 'padata_find_next' in the 'padata_reorder' function, this issue could be reproduced easily with ltp test (pcrypt_aead01). This can be explained as bellow: pcrypt_aead_encrypt ... padata_do_parallel refcount_inc(&pd->refcnt); // add refcnt ... padata_do_serial padata_reorder // pd while (1) { padata_find_next(pd, true); // using pd queue_work_on ... padata_serial_worker crypto_del_alg padata_put_pd_cnt // sub refcnt padata_free_shell padata_put_pd(ps->pd); // pd is freed // loop again, but pd is freed // call padata_find_next, UAF } In the padata_reorder function, when it loops in 'while', if the alg is deleted, the refcnt may be decreased to 0 before entering 'padata_find_next', which leads to UAF. As mentioned in [1], do_serial is supposed to be called with BHs disabled and always happen under RCU protection, to address this issue, add synchronize_rcu() in 'padata_free_shell' wait for all _do_serial calls to finish. [1] https://lore.kernel.org/all/20221028160401.cccypv4euxikusiq@parnassus.localdomain/ [2] https://lore.kernel.org/linux-kernel/jfjz5d7zwbytztackem7ibzalm5lnxldi2eofeiczqmqs2m7o6@fq426cwnjtkm/
 - Source
 - 416baaa9-dc9f-4396-8d5f-8c081fb06d67
 - NVD status
 - Modified
 - Products
 - linux_kernel
 
CVSS 3.1
- Type
 - Secondary
 - Base score
 - 7.8
 - Impact score
 - 5.9
 - Exploitability score
 - 1.8
 - Vector string
 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
 - Severity
 - HIGH
 
- 134c704f-9b21-4f2e-91b3-4a467353bcc0
 - CWE-416
 
- Hype score
 - Not currently trending
 
🚨 CRITICAL: Rocky Linux 8 kernel-rt security update RLSA-2025:13590 is now available. Patches multiple high-severity CVEs (incl. CVE-2025-21727). A reboot is REQUIRED. Read more: 👉 https://t.co/Aj0JoNfmmD #Linux #Security #InfoSec #CVE https://t.co/HT6cmA7FiS
@Cezar_H_Linux
9 Sept 2025
8 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-21727 In the Linux kernel, the following vulnerability has been resolved: padata: fix UAF in padata_reorder A bug was found when run ltp test: BUG: KASAN: slab-use-after… https://t.co/Q5Uziy2i1Q
@CVEnew
27 Feb 2025
362 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
  {
    "nodes": [
      {
        "negate": false,
        "cpeMatch": [
          {
            "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
            "vulnerable": true,
            "matchCriteriaId": "5FEF389E-870E-4BCB-A3FF-0B8042738CF0",
            "versionEndExcluding": "5.10.235",
            "versionStartIncluding": "5.4"
          },
          {
            "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
            "vulnerable": true,
            "matchCriteriaId": "C708062C-4E1B-465F-AE6D-C09C46400875",
            "versionEndExcluding": "5.15.179",
            "versionStartIncluding": "5.11"
          },
          {
            "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
            "vulnerable": true,
            "matchCriteriaId": "2DA5009C-C9B9-4A1D-9B96-78427E8F232C",
            "versionEndExcluding": "6.1.129",
            "versionStartIncluding": "5.16"
          },
          {
            "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
            "vulnerable": true,
            "matchCriteriaId": "A6D70701-9CB6-4222-A957-00A419878993",
            "versionEndExcluding": "6.6.76",
            "versionStartIncluding": "6.2"
          },
          {
            "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
            "vulnerable": true,
            "matchCriteriaId": "2897389C-A8C3-4D69-90F2-E701B3D66373",
            "versionEndExcluding": "6.12.13",
            "versionStartIncluding": "6.7"
          },
          {
            "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
            "vulnerable": true,
            "matchCriteriaId": "6D4116B1-1BFD-4F23-BA84-169CC05FC5A3",
            "versionEndExcluding": "6.13.2",
            "versionStartIncluding": "6.13"
          }
        ],
        "operator": "OR"
      }
    ]
  }
]