{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-71274","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2026-03-17T09:08:18.458Z","datePublished":"2026-05-06T11:27:07.525Z","dateUpdated":"2026-05-11T21:57:13.516Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T21:57:13.516Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nrpmsg: core: fix race in driver_override_show() and use core helper\n\nThe driver_override_show function reads the driver_override string\nwithout holding the device_lock. However, the store function modifies\nand frees the string while holding the device_lock. This creates a race\ncondition where the string can be freed by the store function while\nbeing read by the show function, leading to a use-after-free.\n\nTo fix this, replace the rpmsg_string_attr macro with explicit show and\nstore functions. The new driver_override_store uses the standard\ndriver_set_override helper. Since the introduction of\ndriver_set_override, the comments in include/linux/rpmsg.h have stated\nthat this helper must be used to set or clear driver_override, but the\nimplementation was not updated until now.\n\nBecause driver_set_override modifies and frees the string while holding\nthe device_lock, the new driver_override_show now correctly holds the\ndevice_lock during the read operation to prevent the race.\n\nAdditionally, since rpmsg_string_attr has only ever been used for\ndriver_override, removing the macro simplifies the code."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/rpmsg/rpmsg_core.c"],"versions":[{"version":"39e47767ec9b22f844c2a07c9d329256960d4021","lessThan":"392c6b68334aa0e0ae9aba95c0a366bcb0d92f5d","status":"affected","versionType":"git"},{"version":"39e47767ec9b22f844c2a07c9d329256960d4021","lessThan":"d66b8074c555e8abb0ae19eea1c9f3635498bdde","status":"affected","versionType":"git"},{"version":"39e47767ec9b22f844c2a07c9d329256960d4021","lessThan":"47615557447185917afa432b7958f87583c417cb","status":"affected","versionType":"git"},{"version":"39e47767ec9b22f844c2a07c9d329256960d4021","lessThan":"90c8353f471821d7ccd4fe573a2402e056192494","status":"affected","versionType":"git"},{"version":"39e47767ec9b22f844c2a07c9d329256960d4021","lessThan":"7654e6e3cd6bdee9602f6063b3c670bd556d7e61","status":"affected","versionType":"git"},{"version":"39e47767ec9b22f844c2a07c9d329256960d4021","lessThan":"2e4a70f3c30910427e5ea848b799066d67b963d5","status":"affected","versionType":"git"},{"version":"39e47767ec9b22f844c2a07c9d329256960d4021","lessThan":"954557957177c3c13d7c655976665b1170da5e50","status":"affected","versionType":"git"},{"version":"39e47767ec9b22f844c2a07c9d329256960d4021","lessThan":"42023d4b6d2661a40ee2dcf7e1a3528a35c638ca","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/rpmsg/rpmsg_core.c"],"versions":[{"version":"4.18","status":"affected"},{"version":"0","lessThan":"4.18","status":"unaffected","versionType":"semver"},{"version":"5.10.252","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.202","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.165","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.128","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.12.75","lessThanOrEqual":"6.12.*","status":"unaffected","versionType":"semver"},{"version":"6.18.16","lessThanOrEqual":"6.18.*","status":"unaffected","versionType":"semver"},{"version":"6.19.6","lessThanOrEqual":"6.19.*","status":"unaffected","versionType":"semver"},{"version":"7.0","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.18","versionEndExcluding":"5.10.252"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.18","versionEndExcluding":"5.15.202"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.18","versionEndExcluding":"6.1.165"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.18","versionEndExcluding":"6.6.128"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.18","versionEndExcluding":"6.12.75"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.18","versionEndExcluding":"6.18.16"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.18","versionEndExcluding":"6.19.6"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.18","versionEndExcluding":"7.0"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/392c6b68334aa0e0ae9aba95c0a366bcb0d92f5d"},{"url":"https://git.kernel.org/stable/c/d66b8074c555e8abb0ae19eea1c9f3635498bdde"},{"url":"https://git.kernel.org/stable/c/47615557447185917afa432b7958f87583c417cb"},{"url":"https://git.kernel.org/stable/c/90c8353f471821d7ccd4fe573a2402e056192494"},{"url":"https://git.kernel.org/stable/c/7654e6e3cd6bdee9602f6063b3c670bd556d7e61"},{"url":"https://git.kernel.org/stable/c/2e4a70f3c30910427e5ea848b799066d67b963d5"},{"url":"https://git.kernel.org/stable/c/954557957177c3c13d7c655976665b1170da5e50"},{"url":"https://git.kernel.org/stable/c/42023d4b6d2661a40ee2dcf7e1a3528a35c638ca"}],"title":"rpmsg: core: fix race in driver_override_show() and use core helper","x_generator":{"engine":"bippy-1.2.0"}}}}