Linux Kernel Vulnerability in pds_core Affects Stability and Performance
CVE-2025-37886
Summary
A vulnerability in the Linux kernel's pds_core component relates to the management of the wait_context within the q_info structure. This issue occurs when the wait_context is treated as a temporary stack variable, leading to potential disruptions in the system. Specifically, under circumstances involving slow firmware development, timeouts in admin queue requests may result. If the firmware later completes its task and sends an interrupt, the system attempts to access a non-existent completion context, causing improper pointer usage and potentially resulting in kernel crashes. This flaw underscores the need for robust memory handling strategies within critical system functions.
Affected Version(s)
Linux 01ba61b55b2041a39c54aefb3153c770dd59a0ef < 1d7c4b2b0bbfb09b55b2dc0e2355d7936bf89381
Linux 01ba61b55b2041a39c54aefb3153c770dd59a0ef < 66d7702b42ffdf0dce4808626088268a4e905ca6
Linux 01ba61b55b2041a39c54aefb3153c770dd59a0ef < 520f012fe75fb8efc9f16a57ef929a7a2115d892
References
Timeline
Vulnerability published
Vulnerability Reserved