CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2025-37886: pds_core: make wait_context part of q_info

Description

In the Linux kernel, the following vulnerability has been resolved:

pds_core: make wait_context part of q_info

Make the wait_context a full part of the q_info struct rather
than a stack variable that goes away after pdsc_adminq_post()
is done so that the context is still available after the wait
loop has given up.

There was a case where a slow development firmware caused
the adminq request to time out, but then later the FW finally
finished the request and sent the interrupt. The handler tried
to complete_all() the completion context that had been created
on the stack in pdsc_adminq_post() but no longer existed.
This caused bad pointer usage, kernel crashes, and much wailing
and gnashing of teeth.

Classification

CVE ID: CVE-2025-37886

Affected Products

Vendor: Linux

Product: Linux

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.02% (probability of being exploited)

EPSS Percentile: 4.6% (scored less or equal to compared to others)

EPSS Date: 2025-06-07 (when was this score calculated)

References

https://nvd.nist.gov/vuln/detail/CVE-2025-37886
https://git.kernel.org/stable/c/1d7c4b2b0bbfb09b55b2dc0e2355d7936bf89381
https://git.kernel.org/stable/c/66d7702b42ffdf0dce4808626088268a4e905ca6
https://git.kernel.org/stable/c/520f012fe75fb8efc9f16a57ef929a7a2115d892
https://git.kernel.org/stable/c/3f77c3dfffc7063428b100c4945ca2a7a8680380

Timeline