[SRU][N][PATCH 0/1] CVE-2025-37838
Tim Whisonant
tim.whisonant at canonical.com
Thu Oct 2 23:28:55 UTC 2025
SRU Justification:
[Impact]
HSI: ssi_protocol: Fix use after free vulnerability in ssi_protocol Driver Due to Race Condition
In the ssi_protocol_probe() function, &ssi->work is bound with
ssip_xmit_work(), In ssip_pn_setup(), the ssip_pn_xmit() function
within the ssip_pn_ops structure is capable of starting the
work.
If we remove the module which will call ssi_protocol_remove()
to make a cleanup, it will free ssi through kfree(ssi),
while the work mentioned above will be used. The sequence
of operations that may lead to a UAF bug is as follows:
CPU0 CPU1
| ssip_xmit_work
ssi_protocol_remove |
kfree(ssi); |
| struct hsi_client *cl = ssi->cl;
| // use ssi
Fix it by ensuring that the work is canceled before proceeding
with the cleanup in ssi_protocol_remove().
[Fix]
Plucky: not affected
Noble: cherry picked from upstream
Jammy: not affected
Focal: submitted separately
Bionic: patch sent to ESM ML
Xenial: patch sent to ESM ML
Trusty: out of scope (medium CVE)
[Test Plan]
Compile and boot tested.
[Where problems could occur]
The change affects the High Speed Synchronous Serial Interface
client driver in the ssip_reset() function. Issues would affect
the reliability of these devices.
Kaixin Wang (1):
HSI: ssi_protocol: Fix use after free vulnerability in ssi_protocol
Driver Due to Race Condition
drivers/hsi/clients/ssi_protocol.c | 1 +
1 file changed, 1 insertion(+)
--
2.43.0
More information about the kernel-team
mailing list