CVE-2025-71274 PUBLISHED

rpmsg: core: fix race in driver_override_show() and use core helper

Assigner: Linux
Reserved: 17.03.2026 Published: 06.05.2026 Updated: 06.05.2026

In the Linux kernel, the following vulnerability has been resolved:

rpmsg: core: fix race in driver_override_show() and use core helper

The driver_override_show function reads the driver_override string without holding the device_lock. However, the store function modifies and frees the string while holding the device_lock. This creates a race condition where the string can be freed by the store function while being read by the show function, leading to a use-after-free.

To fix this, replace the rpmsg_string_attr macro with explicit show and store functions. The new driver_override_store uses the standard driver_set_override helper. Since the introduction of driver_set_override, the comments in include/linux/rpmsg.h have stated that this helper must be used to set or clear driver_override, but the implementation was not updated until now.

Because driver_set_override modifies and frees the string while holding the device_lock, the new driver_override_show now correctly holds the device_lock during the read operation to prevent the race.

Additionally, since rpmsg_string_attr has only ever been used for driver_override, removing the macro simplifies the code.

Product Status

Vendor Linux
Product Linux
Versions Default: unaffected
  • affected from 39e47767ec9b22f844c2a07c9d329256960d4021 to 392c6b68334aa0e0ae9aba95c0a366bcb0d92f5d (excl.)
  • affected from 39e47767ec9b22f844c2a07c9d329256960d4021 to d66b8074c555e8abb0ae19eea1c9f3635498bdde (excl.)
  • affected from 39e47767ec9b22f844c2a07c9d329256960d4021 to 47615557447185917afa432b7958f87583c417cb (excl.)
  • affected from 39e47767ec9b22f844c2a07c9d329256960d4021 to 90c8353f471821d7ccd4fe573a2402e056192494 (excl.)
  • affected from 39e47767ec9b22f844c2a07c9d329256960d4021 to 7654e6e3cd6bdee9602f6063b3c670bd556d7e61 (excl.)
  • affected from 39e47767ec9b22f844c2a07c9d329256960d4021 to 2e4a70f3c30910427e5ea848b799066d67b963d5 (excl.)
  • affected from 39e47767ec9b22f844c2a07c9d329256960d4021 to 954557957177c3c13d7c655976665b1170da5e50 (excl.)
  • affected from 39e47767ec9b22f844c2a07c9d329256960d4021 to 42023d4b6d2661a40ee2dcf7e1a3528a35c638ca (excl.)
Vendor Linux
Product Linux
Versions Default: affected
  • Version 4.18 is affected
  • unaffected from 0 to 4.18 (excl.)
  • unaffected from 5.10.252 to 5.10.* (incl.)
  • unaffected from 5.15.202 to 5.15.* (incl.)
  • unaffected from 6.1.165 to 6.1.* (incl.)
  • unaffected from 6.6.128 to 6.6.* (incl.)
  • unaffected from 6.12.75 to 6.12.* (incl.)
  • unaffected from 6.18.16 to 6.18.* (incl.)
  • unaffected from 6.19.6 to 6.19.* (incl.)
  • unaffected from 7.0 to * (incl.)

References