Upstream information

CVE-2025-68260 at MITRE

Description

In the Linux kernel, the following vulnerability has been resolved:

rust_binder: fix race condition on death_list

Rust Binder contains the following unsafe operation:

// SAFETY: A `NodeDeath` is never inserted into the death list
// of any node other than its owner, so it is either in this
// death list or in no death list.
unsafe { node_inner.death_list.remove(self) };

This operation is unsafe because when touching the prev/next pointers of
a list element, we have to ensure that no other thread is also touching
them in parallel. If the node is present in the list that `remove` is
called on, then that is fine because we have exclusive access to that
list. If the node is not in any list, then it's also ok. But if it's
present in a different list that may be accessed in parallel, then that
may be a data race on the prev/next pointers.

And unfortunately that is exactly what is happening here. In
Node::release, we:

1. Take the lock.
2. Move all items to a local list on the stack.
3. Drop the lock.
4. Iterate the local list on the stack.

Combined with threads using the unsafe remove method on the original
list, this leads to memory corruption of the prev/next pointers. This
leads to crashes like this one:

Unable to handle kernel paging request at virtual address 000bb9841bcac70e
Mem abort info:
ESR = 0x0000000096000044
EC = 0x25: DABT (current EL), IL = 32 bits
SET = 0, FnV = 0
EA = 0, S1PTW = 0
FSC = 0x04: level 0 translation fault
Data abort info:
ISV = 0, ISS = 0x00000044, ISS2 = 0x00000000
CM = 0, WnR = 1, TnD = 0, TagAccess = 0
GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
[000bb9841bcac70e] address between user and kernel address ranges
Internal error: Oops: 0000000096000044 [#1] PREEMPT SMP
google-cdd 538c004.gcdd: context saved(CPU:1)
item - log_kevents is disabled
Modules linked in: ... rust_binder
CPU: 1 UID: 0 PID: 2092 Comm: kworker/1:178 Tainted: G S W OE 6.12.52-android16-5-g98debd5df505-4k #1 f94a6367396c5488d635708e43ee0c888d230b0b
Tainted: [S]=CPU_OUT_OF_SPEC, [W]=WARN, [O]=OOT_MODULE, [E]=UNSIGNED_MODULE
Hardware name: MUSTANG PVT 1.0 based on LGA (DT)
Workqueue: events _RNvXs6_NtCsdfZWD8DztAw_6kernel9workqueueINtNtNtB7_4sync3arc3ArcNtNtCs8QPsHWIn21X_16rust_binder_main7process7ProcessEINtB5_15WorkItemPointerKy0_E3runB13_ [rust_binder]
pstate: 23400005 (nzCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
pc : _RNvXs3_NtCs8QPsHWIn21X_16rust_binder_main7processNtB5_7ProcessNtNtCsdfZWD8DztAw_6kernel9workqueue8WorkItem3run+0x450/0x11f8 [rust_binder]
lr : _RNvXs3_NtCs8QPsHWIn21X_16rust_binder_main7processNtB5_7ProcessNtNtCsdfZWD8DztAw_6kernel9workqueue8WorkItem3run+0x464/0x11f8 [rust_binder]
sp : ffffffc09b433ac0
x29: ffffffc09b433d30 x28: ffffff8821690000 x27: ffffffd40cbaa448
x26: ffffff8821690000 x25: 00000000ffffffff x24: ffffff88d0376578
x23: 0000000000000001 x22: ffffffc09b433c78 x21: ffffff88e8f9bf40
x20: ffffff88e8f9bf40 x19: ffffff882692b000 x18: ffffffd40f10bf00
x17: 00000000c006287d x16: 00000000c006287d x15: 00000000000003b0
x14: 0000000000000100 x13: 000000201cb79ae0 x12: fffffffffffffff0
x11: 0000000000000000 x10: 0000000000000001 x9 : 0000000000000000
x8 : b80bb9841bcac706 x7 : 0000000000000001 x6 : fffffffebee63f30
x5 : 0000000000000000 x4 : 0000000000000001 x3 : 0000000000000000
x2 : 0000000000004c31 x1 : ffffff88216900c0 x0 : ffffff88e8f9bf00
Call trace:
_RNvXs3_NtCs8QPsHWIn21X_16rust_binder_main7processNtB5_7ProcessNtNtCsdfZWD8DztAw_6kernel9workqueue8WorkItem3run+0x450/0x11f8 [rust_binder bbc172b53665bbc815363b22e97e3f7e3fe971fc]
process_scheduled_works+0x1c4/0x45c
worker_thread+0x32c/0x3e8
kthread+0x11c/0x1c8
ret_from_fork+0x10/0x20
Code: 94218d85 b4000155 a94026a8 d10102a0 (f9000509)
---[ end trace 0000000000000000 ]---

Thus, modify Node::release to pop items directly off the original list.

SUSE information

Overall state of this security issue: Analysis

This issue is currently rated as having not set severity.

Note from the SUSE Security Team on the kernel-default package

SUSE will no longer fix all CVEs in the Linux Kernel anymore, but declare some bug classes as won't fix. Please refer to TID 21496 for more details.

SUSE Bugzilla entry: 1255177 [NEW]

No SUSE Security Announcements cross referenced.


Status of this issue by product and package

Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification. The updates are grouped by state of their lifecycle. SUSE product lifecycles are documented on the lifecycle page.

Product(s) Source package State
Products under general support and receiving all security fixes.
SUSE Linux Enterprise Desktop 15 SP6 kernel-default Analysis
SUSE Linux Enterprise Desktop 15 SP6 kernel-source Analysis
SUSE Linux Enterprise Desktop 15 SP7 kernel-default Analysis
SUSE Linux Enterprise Desktop 15 SP7 kernel-source Analysis
SUSE Linux Enterprise High Availability Extension 15 SP7 kernel-default Analysis
SUSE Linux Enterprise High Availability Extension 15 SP7 kernel-source Analysis
SUSE Linux Enterprise High Availability Extension 16.0 kernel-default Analysis
SUSE Linux Enterprise High Availability Extension 16.0 kernel-source Analysis
SUSE Linux Enterprise High Performance Computing 15 SP6 kernel-default Analysis
SUSE Linux Enterprise High Performance Computing 15 SP6 kernel-source Analysis
SUSE Linux Enterprise High Performance Computing 15 SP6 kernel-source-azure Analysis
SUSE Linux Enterprise High Performance Computing 15 SP7 kernel-default Analysis
SUSE Linux Enterprise High Performance Computing 15 SP7 kernel-source Analysis
SUSE Linux Enterprise High Performance Computing 15 SP7 kernel-source-azure Analysis
SUSE Linux Enterprise Live Patching 15 SP6 kernel-default Analysis
SUSE Linux Enterprise Live Patching 15 SP6 kernel-source Analysis
SUSE Linux Enterprise Live Patching 15 SP7 kernel-default Analysis
SUSE Linux Enterprise Live Patching 15 SP7 kernel-source Analysis
SUSE Linux Enterprise Micro 5.2 kernel-default Analysis
SUSE Linux Enterprise Micro 5.2 kernel-rt Analysis
SUSE Linux Enterprise Micro 5.2 kernel-source Analysis
SUSE Linux Enterprise Micro 5.2 kernel-source-rt Analysis
SUSE Linux Enterprise Micro 5.3 kernel-default Analysis
SUSE Linux Enterprise Micro 5.3 kernel-rt Analysis
SUSE Linux Enterprise Micro 5.3 kernel-source Analysis
SUSE Linux Enterprise Micro 5.3 kernel-source-rt Analysis
SUSE Linux Enterprise Micro 5.4 kernel-default Analysis
SUSE Linux Enterprise Micro 5.4 kernel-rt Analysis
SUSE Linux Enterprise Micro 5.4 kernel-source Analysis
SUSE Linux Enterprise Micro 5.4 kernel-source-rt Analysis
SUSE Linux Enterprise Micro 5.5 kernel-default Analysis
SUSE Linux Enterprise Micro 5.5 kernel-source Analysis
SUSE Linux Enterprise Micro 5.5 kernel-source-rt Analysis
SUSE Linux Enterprise Module for Basesystem 15 SP6 kernel-default Analysis
SUSE Linux Enterprise Module for Basesystem 15 SP6 kernel-source Analysis
SUSE Linux Enterprise Module for Basesystem 15 SP7 kernel-default Analysis
SUSE Linux Enterprise Module for Basesystem 15 SP7 kernel-source Analysis
SUSE Linux Enterprise Module for Development Tools 15 SP6 kernel-default Analysis
SUSE Linux Enterprise Module for Development Tools 15 SP6 kernel-source Analysis
SUSE Linux Enterprise Module for Development Tools 15 SP7 kernel-default Analysis
SUSE Linux Enterprise Module for Development Tools 15 SP7 kernel-source Analysis
SUSE Linux Enterprise Module for Legacy 15 SP6 kernel-default Analysis
SUSE Linux Enterprise Module for Legacy 15 SP6 kernel-source Analysis
SUSE Linux Enterprise Module for Legacy 15 SP7 kernel-default Analysis
SUSE Linux Enterprise Module for Legacy 15 SP7 kernel-source Analysis
SUSE Linux Enterprise Module for Public Cloud 15 SP6 kernel-source-azure Analysis
SUSE Linux Enterprise Module for Public Cloud 15 SP7 kernel-source-azure Analysis
SUSE Linux Enterprise Real Time 15 SP6 kernel-source-rt Analysis
SUSE Linux Enterprise Real Time 15 SP7 kernel-source-rt Analysis
SUSE Linux Enterprise Server 15 SP6 kernel-default Analysis
SUSE Linux Enterprise Server 15 SP6 kernel-source Analysis
SUSE Linux Enterprise Server 15 SP6 kernel-source-azure Analysis
SUSE Linux Enterprise Server 15 SP7 kernel-default Analysis
SUSE Linux Enterprise Server 15 SP7 kernel-source Analysis
SUSE Linux Enterprise Server 15 SP7 kernel-source-azure Analysis
SUSE Linux Enterprise Server 16.0 kernel-source Analysis
SUSE Linux Enterprise Server for SAP Applications 15 SP6 kernel-default Analysis
SUSE Linux Enterprise Server for SAP Applications 15 SP6 kernel-source Analysis
SUSE Linux Enterprise Server for SAP Applications 15 SP6 kernel-source-azure Analysis
SUSE Linux Enterprise Server for SAP Applications 15 SP7 kernel-default Analysis
SUSE Linux Enterprise Server for SAP Applications 15 SP7 kernel-source Analysis
SUSE Linux Enterprise Server for SAP Applications 15 SP7 kernel-source-azure Analysis
SUSE Linux Enterprise Workstation Extension 15 SP6 kernel-default Analysis
SUSE Linux Enterprise Workstation Extension 15 SP6 kernel-source Analysis
SUSE Linux Enterprise Workstation Extension 15 SP7 kernel-default Analysis
SUSE Linux Enterprise Workstation Extension 15 SP7 kernel-source Analysis
SUSE Linux Micro 6.0 kernel-default Analysis
SUSE Linux Micro 6.0 kernel-source Analysis
SUSE Linux Micro 6.0 kernel-source-rt Analysis
SUSE Linux Micro 6.1 kernel-default Analysis
SUSE Linux Micro 6.1 kernel-source Analysis
SUSE Linux Micro 6.1 kernel-source-rt Analysis
SUSE Linux Micro 6.2 kernel-source Analysis
SUSE Real Time Module 15 SP6 kernel-source-rt Analysis
SUSE Real Time Module 15 SP7 kernel-source-rt Analysis
openSUSE Leap 15.6 kernel-default Analysis
openSUSE Leap 15.6 kernel-source Analysis
openSUSE Leap 15.6 kernel-source-azure Analysis
openSUSE Leap 15.6 kernel-source-rt Analysis
Products under Long Term Service Pack support and receiving important and critical security fixes.
SUSE Linux Enterprise High Availability Extension 15 SP3 kernel-default Analysis
SUSE Linux Enterprise High Availability Extension 15 SP3 kernel-source Analysis
SUSE Linux Enterprise High Performance Computing 15 SP3 kernel-source Analysis
SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS kernel-source Analysis
SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS kernel-default Analysis
SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS kernel-source Analysis
SUSE Linux Enterprise High Performance Computing 15 SP4 kernel-source Analysis
SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS kernel-default Analysis
SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS kernel-source Analysis
SUSE Linux Enterprise High Performance Computing 15 SP5 kernel-source Analysis
SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS kernel-default Analysis
SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS kernel-source Analysis
SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS kernel-default Analysis
SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS kernel-source Analysis
SUSE Linux Enterprise Live Patching 12 SP5 kernel-default Analysis
SUSE Linux Enterprise Live Patching 12 SP5 kernel-source Analysis
SUSE Linux Enterprise Live Patching 15 SP3 kernel-default Analysis
SUSE Linux Enterprise Live Patching 15 SP3 kernel-source Analysis
SUSE Linux Enterprise Live Patching 15 SP4 kernel-default Analysis
SUSE Linux Enterprise Live Patching 15 SP4 kernel-source Analysis
SUSE Linux Enterprise Live Patching 15 SP5 kernel-default Analysis
SUSE Linux Enterprise Live Patching 15 SP5 kernel-source Analysis
SUSE Linux Enterprise Module for Basesystem 15 SP3 kernel-source Analysis
SUSE Linux Enterprise Module for Basesystem 15 SP4 kernel-source Analysis
SUSE Linux Enterprise Module for Basesystem 15 SP5 kernel-source Analysis
SUSE Linux Enterprise Module for Development Tools 15 SP3 kernel-source Analysis
SUSE Linux Enterprise Module for Development Tools 15 SP4 kernel-source Analysis
SUSE Linux Enterprise Module for Development Tools 15 SP5 kernel-source Analysis
SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE kernel-default Analysis
SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE kernel-source Analysis
SUSE Linux Enterprise Server 12 SP5 kernel-source Analysis
SUSE Linux Enterprise Server 12 SP5-LTSS kernel-default Analysis
SUSE Linux Enterprise Server 12 SP5-LTSS kernel-source Analysis
SUSE Linux Enterprise Server 12 SP5-LTSS Extended Security kernel-default Analysis
SUSE Linux Enterprise Server 12 SP5-LTSS Extended Security kernel-source Analysis
SUSE Linux Enterprise Server 15 SP3 kernel-source Analysis
SUSE Linux Enterprise Server 15 SP3-LTSS kernel-default Analysis
SUSE Linux Enterprise Server 15 SP3-LTSS kernel-source Analysis
SUSE Linux Enterprise Server 15 SP4 kernel-source Analysis
SUSE Linux Enterprise Server 15 SP4-LTSS kernel-default Analysis
SUSE Linux Enterprise Server 15 SP4-LTSS kernel-source Analysis
SUSE Linux Enterprise Server 15 SP5 kernel-source Analysis
SUSE Linux Enterprise Server 15 SP5-LTSS kernel-default Analysis
SUSE Linux Enterprise Server 15 SP5-LTSS kernel-source Analysis
SUSE Linux Enterprise Server LTSS Extended Security 12 SP5 kernel-source Analysis
SUSE Manager Proxy 4.3 kernel-source Analysis
SUSE Manager Proxy LTS 4.3 kernel-default Analysis
SUSE Manager Proxy LTS 4.3 kernel-source Analysis
SUSE Manager Retail Branch Server 4.3 kernel-source Analysis
SUSE Manager Retail Branch Server LTS 4.3 kernel-default Analysis
SUSE Manager Retail Branch Server LTS 4.3 kernel-source Analysis
SUSE Manager Server 4.3 kernel-source Analysis
SUSE Manager Server LTS 4.3 kernel-default Analysis
SUSE Manager Server LTS 4.3 kernel-source Analysis
Products past their end of life and not receiving proactive updates anymore.
SUSE CaaS Platform 4.0 kernel-source Analysis
SUSE Enterprise Storage 6 kernel-source Analysis
SUSE Enterprise Storage 7 kernel-source Analysis
SUSE Enterprise Storage 7.1 kernel-source Analysis
SUSE Linux Enterprise Desktop 11 SP4 kernel-source Analysis
SUSE Linux Enterprise Desktop 12 SP2 kernel-source Analysis
SUSE Linux Enterprise Desktop 12 SP4 kernel-source Analysis
SUSE Linux Enterprise Desktop 15 kernel-source Analysis
SUSE Linux Enterprise Desktop 15 SP1 kernel-source Analysis
SUSE Linux Enterprise Desktop 15 SP2 kernel-source Analysis
SUSE Linux Enterprise Desktop 15 SP3 kernel-source Analysis
SUSE Linux Enterprise Desktop 15 SP4 kernel-source Analysis
SUSE Linux Enterprise Desktop 15 SP5 kernel-source Analysis
SUSE Linux Enterprise High Performance Computing 15 kernel-source Analysis
SUSE Linux Enterprise High Performance Computing 15 SP1 kernel-source Analysis
SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS kernel-source Analysis
SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS kernel-source Analysis
SUSE Linux Enterprise High Performance Computing 15 SP2 kernel-source Analysis
SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS kernel-source Analysis
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS kernel-source Analysis
SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS kernel-source Analysis
SUSE Linux Enterprise High Performance Computing 15-ESPOS kernel-source Analysis
SUSE Linux Enterprise High Performance Computing 15-LTSS kernel-source Analysis
SUSE Linux Enterprise Micro 5.0 kernel-default Analysis
SUSE Linux Enterprise Micro 5.1 kernel-default Analysis
SUSE Linux Enterprise Micro 5.1 kernel-rt Analysis
SUSE Linux Enterprise Micro 5.1 kernel-source-rt Analysis
SUSE Linux Enterprise Module for Basesystem 15 kernel-source Analysis
SUSE Linux Enterprise Module for Basesystem 15 SP1 kernel-source Analysis
SUSE Linux Enterprise Module for Basesystem 15 SP2 kernel-source Analysis
SUSE Linux Enterprise Module for Development Tools 15 kernel-source Analysis
SUSE Linux Enterprise Module for Development Tools 15 SP1 kernel-source Analysis
SUSE Linux Enterprise Module for Development Tools 15 SP2 kernel-source Analysis
SUSE Linux Enterprise Point of Sale 12 SP2-CLIENT kernel-source Analysis
SUSE Linux Enterprise Real Time 15 SP2 kernel-source Analysis
SUSE Linux Enterprise Real Time 15 SP3 kernel-source Analysis
SUSE Linux Enterprise Real Time 15 SP3 kernel-source-rt Analysis
SUSE Linux Enterprise Real Time 15 SP4 kernel-source Analysis
SUSE Linux Enterprise Real Time 15 SP4 kernel-source-rt Analysis
SUSE Linux Enterprise Real Time 15 SP5 kernel-source-rt Analysis
SUSE Linux Enterprise Server 11 SP4 kernel-source Analysis
SUSE Linux Enterprise Server 11 SP4 LTSS kernel-default Analysis
SUSE Linux Enterprise Server 11 SP4 LTSS kernel-source Analysis
SUSE Linux Enterprise Server 11 SP4-LTSS kernel-source Analysis
SUSE Linux Enterprise Server 12 SP2 kernel-source Analysis
SUSE Linux Enterprise Server 12 SP2-BCL kernel-source Analysis
SUSE Linux Enterprise Server 12 SP2-ESPOS kernel-source Analysis
SUSE Linux Enterprise Server 12 SP2-LTSS kernel-default Analysis
SUSE Linux Enterprise Server 12 SP2-LTSS kernel-source Analysis
SUSE Linux Enterprise Server 12 SP4 kernel-source Analysis
SUSE Linux Enterprise Server 12 SP4-ESPOS kernel-source Analysis
SUSE Linux Enterprise Server 12 SP4-LTSS kernel-default Analysis
SUSE Linux Enterprise Server 12 SP4-LTSS kernel-source Analysis
SUSE Linux Enterprise Server 15 kernel-source Analysis
SUSE Linux Enterprise Server 15 SP1 kernel-source Analysis
SUSE Linux Enterprise Server 15 SP1-BCL kernel-source Analysis
SUSE Linux Enterprise Server 15 SP1-LTSS kernel-default Analysis
SUSE Linux Enterprise Server 15 SP1-LTSS kernel-source Analysis
SUSE Linux Enterprise Server 15 SP2 kernel-source Analysis
SUSE Linux Enterprise Server 15 SP2-BCL kernel-source Analysis
SUSE Linux Enterprise Server 15 SP2-LTSS kernel-default Analysis
SUSE Linux Enterprise Server 15 SP2-LTSS kernel-source Analysis
SUSE Linux Enterprise Server 15 SP3-BCL kernel-source Analysis
SUSE Linux Enterprise Server 15-LTSS kernel-default Analysis
SUSE Linux Enterprise Server 15-LTSS kernel-source Analysis
SUSE Linux Enterprise Server for Raspberry Pi 12 SP2 kernel-source Analysis
SUSE Linux Enterprise Server for SAP Applications 12 SP2 kernel-source Analysis
SUSE Linux Enterprise Server for SAP Applications 12 SP4 kernel-source Analysis
SUSE Linux Enterprise Server for SAP Applications 15 kernel-source Analysis
SUSE Linux Enterprise Server for SAP Applications 15 SP1 kernel-source Analysis
SUSE Linux Enterprise Server for SAP Applications 15 SP2 kernel-source Analysis
SUSE Linux Enterprise Server for SAP Applications 15 SP3 kernel-default Analysis
SUSE Linux Enterprise Server for SAP Applications 15 SP3 kernel-source Analysis
SUSE Linux Enterprise Server for SAP Applications 15 SP4 kernel-default Analysis
SUSE Linux Enterprise Server for SAP Applications 15 SP4 kernel-source Analysis
SUSE Linux Enterprise Server for SAP Applications 15 SP5 kernel-default Analysis
SUSE Linux Enterprise Server for SAP Applications 15 SP5 kernel-source Analysis
SUSE Manager Proxy 4.0 kernel-source Analysis
SUSE Manager Proxy 4.1 kernel-source Analysis
SUSE Manager Proxy 4.2 kernel-source Analysis
SUSE Manager Retail Branch Server 4.0 kernel-source Analysis
SUSE Manager Retail Branch Server 4.1 kernel-source Analysis
SUSE Manager Retail Branch Server 4.2 kernel-source Analysis
SUSE Manager Server 4.0 kernel-source Analysis
SUSE Manager Server 4.1 kernel-source Analysis
SUSE Manager Server 4.2 kernel-source Analysis
SUSE OpenStack Cloud 7 kernel-source Analysis
SUSE OpenStack Cloud 9 kernel-source Analysis
SUSE OpenStack Cloud Crowbar 9 kernel-source Analysis
SUSE Real Time Module 15 SP3 kernel-source-rt Analysis
SUSE Real Time Module 15 SP4 kernel-source-rt Analysis
SUSE Real Time Module 15 SP5 kernel-source-rt Analysis
openSUSE Leap 15.3 kernel-source Analysis
openSUSE Leap 15.3 kernel-source-rt Analysis
openSUSE Leap 15.4 kernel-source Analysis
openSUSE Leap 15.4 kernel-source-rt Analysis
openSUSE Leap 15.5 kernel-source Analysis
openSUSE Leap 15.5 kernel-source-rt Analysis
Products at an unknown state of their lifecycle.
SUSE Linux Enterprise Server 15 SP6-LTSS kernel-source Analysis
SUSE Linux Enterprise Server for SAP Applications 16.0 kernel-source Analysis


SUSE Timeline for this CVE

CVE page created: Tue Dec 16 16:07:28 2025
CVE page last modified: Wed Dec 17 14:44:51 2025