CVE-2025-22036

Source
https://cve.org/CVERecord?id=CVE-2025-22036
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-22036.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-22036
Downstream
Related
Published
2025-04-16T14:11:54.916Z
Modified
2026-03-20T12:41:17.834985Z
Severity
  • 7.0 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
exfat: fix random stack corruption after get_block
Details

In the Linux kernel, the following vulnerability has been resolved:

exfat: fix random stack corruption after get_block

When getblock is called with a bufferhead allocated on the stack, such as dompagereadpage, stack corruption due to buffer_head UAF may occur in the following race condition situation.

 <CPU 0>                      <CPU 1>

mpagereadfolio <<bh on stack>> dompagereadpage exfatgetblock bh_read __bhread getbh(bh) submitbh waitonbuffer ... endbufferreadsync __endbufferreadnotouch unlockbuffer <<keep going>> ... ... ... ... <<bh is not valid out of mpagereadfolio>> . . anotherfunction <<variable A on stack>> putbh(bh) atomicdec(bh->bcount) * stack corruption here *

This patch returns -EAGAIN if a folio does not have buffers when bhread needs to be called. By doing this, the caller can fallback to functions like blockreadfullfolio(), create a bufferhead in the folio, and then call getblock again.

Let's do not call bhread() with on-stack bufferhead.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/22xxx/CVE-2025-22036.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
11a347fb6cef62ce47e84b97c45f2b2497c7593b
Fixed
49b0a6ab8e528a0c1c50e37cef9b9c7c121365f2
Fixed
f7447286363dc1e410bf30b87d75168f3519f9cc
Fixed
f807a6bf2005740fa26b4f59c4a003dc966b9afd
Fixed
1bb7ff4204b6d4927e982cd256286c09ed4fd8ca

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-22036.json"