CVE-2025-71221
📋 TL;DR
A race condition in the Linux kernel's mmp_pdma_residue() function allows use-after-free when multiple threads access DMA descriptors while they're being freed. This affects systems using the mmp_pdma driver for DMA operations, potentially leading to kernel crashes or instability. The vulnerability requires local access to trigger.
💻 Affected Systems
- Linux kernel with mmp_pdma driver enabled
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Kernel panic or system crash leading to denial of service, with potential for privilege escalation if memory corruption can be controlled.
Likely Case
System instability, kernel crashes, or application failures when DMA operations are heavily utilized with multiple threads.
If Mitigated
No impact if patched or if the vulnerable driver is not in use.
🎯 Exploit Status
Requires local access and ability to trigger DMA operations with multiple threads. Race conditions are timing-dependent and harder to reliably exploit.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Kernel versions containing commit 9f665b3c3d9a168410251f27a5d019b7bf93185c
Vendor Advisory: https://git.kernel.org/stable/c/9f665b3c3d9a168410251f27a5d019b7bf93185c
Restart Required: Yes
Instructions:
1. Update Linux kernel to version containing the fix commit. 2. Reboot system to load new kernel. 3. Verify the driver is no longer vulnerable.
🔧 Temporary Workarounds
Disable mmp_pdma driver
LinuxRemove or blacklist the vulnerable driver if not needed
echo 'blacklist mmp_pdma' > /etc/modprobe.d/blacklist-mmp-pdma.conf
rmmod mmp_pdma
Limit DMA test threads
LinuxPrevent triggering condition by limiting concurrent DMA operations
echo 1 > /sys/module/dmatest/parameters/threads_per_chan
🧯 If You Can't Patch
- Avoid using the mmp_pdma DMA driver if possible
- Restrict local user access to prevent triggering the race condition
🔍 How to Verify
Check if Vulnerable:
Check if mmp_pdma module is loaded: lsmod | grep mmp_pdma AND check kernel version against patched versions
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version includes fix commit: grep -q '9f665b3c3d9a168410251f27a5d019b7bf93185c' /proc/version_signature || uname -r
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages
- Oops messages related to DMA or mmp_pdma
- System crash logs
Network Indicators:
- None - local vulnerability only
SIEM Query:
source="kernel" AND ("mmp_pdma" OR "DMA" OR "Oops" OR "kernel panic")