Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-39977— futex: Prevent use-after-free during requeue-PI

EPSS 0.04% · P13
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-39977

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
futex: Prevent use-after-free during requeue-PI
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: futex: Prevent use-after-free during requeue-PI syzbot managed to trigger the following race: T1 T2 futex_wait_requeue_pi() futex_do_wait() schedule() futex_requeue() futex_proxy_trylock_atomic() futex_requeue_pi_prepare() requeue_pi_wake_futex() futex_requeue_pi_complete() /* preempt */ * timeout/ signal wakes T1 * futex_requeue_pi_wakeup_sync() // Q_REQUEUE_PI_LOCKED futex_hash_put() // back to userland, on stack futex_q is garbage /* back */ wake_up_state(q->task, TASK_NORMAL); In this scenario futex_wait_requeue_pi() is able to leave without using futex_q::lock_ptr for synchronization. This can be prevented by reading futex_q::task before updating the futex_q::requeue_state. A reference on the task_struct is not needed because requeue_pi_wake_futex() is invoked with a spinlock_t held which implies a RCU read section. Even if T1 terminates immediately after, the task_struct will remain valid during T2's wake_up_state(). A READ_ONCE on futex_q::task before futex_requeue_pi_complete() is enough because it ensures that the variable is read before the state is updated. Read futex_q::task before updating the requeue state, use it for the following wakeup.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于futex_wait_requeue_pi函数中存在释放后重用问题。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux 07d91ef510fb16a2e0ca7453222105835b7ba3b8 ~ cb5d19a61274b51b49601214a87af573b43d60fa -
LinuxLinux 5.15 -

II. Public POCs for CVE-2025-39977

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-39977

登录查看更多情报信息。

Same Patch Batch · Linux · 2025-10-15 · 34 CVEs total

CVE-2025-39973i40e: add validation for ring_len param
CVE-2025-39982Bluetooth: hci_event: Fix UAF in hci_acl_create_conn_sync
CVE-2025-39981Bluetooth: MGMT: Fix possible UAFs
CVE-2025-39979net/mlx5: fs, fix UAF in flow counter release
CVE-2025-39980nexthop: Forbid FDB status change while nexthop is in a group
CVE-2025-39978octeontx2-pf: Fix potential use after free in otx2_tc_add_flow()
CVE-2025-39976futex: Use correct exit on failure from futex_hash_allocate_default()
CVE-2025-39975smb: client: fix wrong index reference in smb2_compound_op()
CVE-2025-39974tracing/osnoise: Fix slab-out-of-bounds in _parse_integer_limit()
CVE-2025-39984net: tun: Update napi->skb after XDP process
CVE-2025-39972i40e: fix idx validation in i40e_validate_queue_map
CVE-2025-39970i40e: fix input validation logic for action_meta
CVE-2025-39971i40e: fix idx validation in config queues msg
CVE-2025-39969i40e: fix validation of VF state in get resources
CVE-2025-39968i40e: add max boundary check for VF filters
CVE-2025-39967fbcon: fix integer overflow in fbcon_do_set_font
CVE-2025-39966iommufd: Fix race during abort for file descriptors
CVE-2025-40000wifi: rtw89: fix use-after-free in rtw89_core_tx_kick_off_and_wait()
CVE-2025-39983Bluetooth: hci_event: Fix UAF in hci_conn_tx_dequeue
CVE-2025-39985can: mcba_usb: populate ndo_change_mtu() to prevent buffer overflow

Showing top 20 of 34 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2025-39977

No comments yet


Leave a comment