Description Preview
Overview
The vulnerability stems from the use of a shared workqueue (qat_misc_wq) across all QAT devices, managed by the core intel_qat.ko driver. When a device-specific driver is unloaded, pending work items in this shared queue may still reference the unloaded driver's memory. If these items execute after unloading, they attempt to access freed memory, leading to a page fault and kernel crash. This scenario is particularly likely when rapidly loading and unloading QAT drivers, creating a race condition between driver unloading and workqueue execution.
Remediation
To address this vulnerability, the Linux kernel has implemented a fix that flushes the misc workqueue during device shutdown. This ensures all pending work items complete before the driver unloads, preventing the use-after-free condition. While this approach may slightly increase shutdown latency if the workqueue contains jobs from other devices, it significantly improves system stability and prevents potential crashes. Users and administrators should update their Linux kernel to a version that includes this fix to mitigate the vulnerability.
References
[1] Linux Kernel Git Repository, "crypto: qat - flush misc workqueue during device shutdown," https://git.kernel.org/stable/c/3d4df408ba9bad2b205c7fb8afc1836a6a4ca88a
[2] Linux Kernel Git Repository, "Commit 5858448a6c65d8ee3f8600570d3ce19febcb33be," https://git.kernel.org/stable/c/5858448a6c65d8ee3f8600570d3ce19febcb33be
[3] Linux Kernel Git Repository, "Commit e59a52e429e13df3feb34f4853a8e36d121ed937," https://git.kernel.org/stable/c/e59a52e429e13df3feb34f4853a8e36d121ed937
[4] Linux Kernel Git Repository, "Commit fe546f5c50fc474daca6bee72caa7ab68a74c33d," https://git.kernel.org/stable/c/fe546f5c50fc474daca6bee72caa7ab68a74c33d
Industry ExposureMost to leastThis section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.
- ManufacturingManufacturing: Medium
- Public AdministrationPublic Administration: Medium
- Health Care & Social AssistanceHealth Care & Social Assistance: Low
- Professional, Scientific, & Technical ServicesProfessional, Scientific, & Technical Services: Low
- Retail TradeRetail Trade: Low
- Finance and InsuranceFinance and Insurance: Low
- Educational ServicesEducational Services: Low
- Arts, Entertainment & RecreationArts, Entertainment & Recreation: Low
- Management of Companies & EnterprisesManagement of Companies & Enterprises: Low
- Transportation & WarehousingTransportation & Warehousing: Low
- Other Services (except Public Administration)Other Services (except Public Administration): Low
- Agriculture, Forestry Fishing & HuntingAgriculture, Forestry Fishing & Hunting: Low
- InformationInformation: Low
- Real Estate Rental & LeasingReal Estate Rental & Leasing: Low
- UtilitiesUtilities: Low
- Accommodation & Food ServicesAccommodation & Food Services: Low
- Administrative, Support, Waste Management & Remediation ServicesAdministrative, Support, Waste Management & Remediation Services: Low
- ConstructionConstruction: Low
- MiningMining: Low
- Wholesale TradeWholesale Trade: Low

