CVE-2025-22036

Source
https://cve.org/CVERecord?id=CVE-2025-22036
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-22036.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-22036
Downstream
Related
Published
2025-04-16T14:11:54.916Z
Modified
2026-03-12T18:59:28.795349Z
Severity
  • 7.0 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
exfat: fix random stack corruption after get_block
Details

In the Linux kernel, the following vulnerability has been resolved:

exfat: fix random stack corruption after get_block

When getblock is called with a bufferhead allocated on the stack, such as dompagereadpage, stack corruption due to buffer_head UAF may occur in the following race condition situation.

 <CPU 0>                      <CPU 1>

mpagereadfolio <<bh on stack>> dompagereadpage exfatgetblock bh_read __bhread getbh(bh) submitbh waitonbuffer ... endbufferreadsync __endbufferreadnotouch unlockbuffer <<keep going>> ... ... ... ... <<bh is not valid out of mpagereadfolio>> . . anotherfunction <<variable A on stack>> putbh(bh) atomicdec(bh->bcount) * stack corruption here *

This patch returns -EAGAIN if a folio does not have buffers when bhread needs to be called. By doing this, the caller can fallback to functions like blockreadfullfolio(), create a bufferhead in the folio, and then call getblock again.

Let's do not call bhread() with on-stack bufferhead.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/22xxx/CVE-2025-22036.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
11a347fb6cef62ce47e84b97c45f2b2497c7593b
Fixed
49b0a6ab8e528a0c1c50e37cef9b9c7c121365f2
Fixed
f7447286363dc1e410bf30b87d75168f3519f9cc
Fixed
f807a6bf2005740fa26b4f59c4a003dc966b9afd
Fixed
1bb7ff4204b6d4927e982cd256286c09ed4fd8ca

Affected versions

v6.*
v6.10
v6.10-rc1
v6.10-rc2
v6.10-rc3
v6.10-rc4
v6.10-rc5
v6.10-rc6
v6.10-rc7
v6.11
v6.11-rc1
v6.11-rc2
v6.11-rc3
v6.11-rc4
v6.11-rc5
v6.11-rc6
v6.11-rc7
v6.12
v6.12-rc1
v6.12-rc2
v6.12-rc3
v6.12-rc4
v6.12-rc5
v6.12-rc6
v6.12-rc7
v6.12.1
v6.12.10
v6.12.11
v6.12.12
v6.12.13
v6.12.14
v6.12.15
v6.12.16
v6.12.17
v6.12.18
v6.12.19
v6.12.2
v6.12.20
v6.12.21
v6.12.22
v6.12.3
v6.12.4
v6.12.5
v6.12.6
v6.12.7
v6.12.8
v6.12.9
v6.13
v6.13-rc1
v6.13-rc2
v6.13-rc3
v6.13-rc4
v6.13-rc5
v6.13-rc6
v6.13-rc7
v6.13.1
v6.13.10
v6.13.2
v6.13.3
v6.13.4
v6.13.5
v6.13.6
v6.13.7
v6.13.8
v6.13.9
v6.14
v6.14-rc1
v6.14-rc2
v6.14-rc3
v6.14-rc4
v6.14-rc5
v6.14-rc6
v6.14-rc7
v6.14.1
v6.8
v6.8-rc1
v6.8-rc2
v6.8-rc3
v6.8-rc4
v6.8-rc5
v6.8-rc6
v6.8-rc7
v6.9
v6.9-rc1
v6.9-rc2
v6.9-rc3
v6.9-rc4
v6.9-rc5
v6.9-rc6
v6.9-rc7

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-22036.json"
vanir_signatures
[
    {
        "signature_version": "v1",
        "target": {
            "file": "fs/exfat/inode.c"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@49b0a6ab8e528a0c1c50e37cef9b9c7c121365f2",
        "deprecated": false,
        "digest": {
            "line_hashes": [
                "39369033618176617488055725797295418827",
                "220565578559665038205163505349068850445",
                "309866596014286073777046594658907824208",
                "49795299144915144465287509042208446071",
                "69275115081776500904546955202395343610",
                "287200565914811718446910778253564561433",
                "223066303825561420644584125405314953918",
                "273737245289027503842642533654702570304",
                "265640560442691535540276968357228377613",
                "272653439903131089037951613978958654462",
                "215466107820663658695092941611725363299",
                "72723981675123741055309109213491485630",
                "263066012294777101660153284935979385001",
                "285461944835065014784841917207993236387",
                "683403756105609177874383991181668515",
                "202748498698086737697515179275049506565",
                "240544082771141837389021724182222615736",
                "132402927482702682898101710312558237302",
                "46311356250773778107713477586757301390",
                "82800678737817158568702467947708153992"
            ],
            "threshold": 0.9
        },
        "id": "CVE-2025-22036-48016f65",
        "signature_type": "Line"
    },
    {
        "signature_version": "v1",
        "target": {
            "file": "fs/exfat/inode.c",
            "function": "exfat_get_block"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@49b0a6ab8e528a0c1c50e37cef9b9c7c121365f2",
        "deprecated": false,
        "digest": {
            "function_hash": "137070133949232653412761293334749813189",
            "length": 1981.0
        },
        "id": "CVE-2025-22036-967d96cc",
        "signature_type": "Function"
    }
]