CVE-2025-21767
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
27/02/2025
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
clocksource: Use migrate_disable() to avoid calling get_random_u32() in atomic context<br />
<br />
The following bug report happened with a PREEMPT_RT kernel:<br />
<br />
BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:48<br />
in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 2012, name: kwatchdog<br />
preempt_count: 1, expected: 0<br />
RCU nest depth: 0, expected: 0<br />
get_random_u32+0x4f/0x110<br />
clocksource_verify_choose_cpus+0xab/0x1a0<br />
clocksource_verify_percpu.part.0+0x6b/0x330<br />
clocksource_watchdog_kthread+0x193/0x1a0<br />
<br />
It is due to the fact that clocksource_verify_choose_cpus() is invoked with<br />
preemption disabled. This function invokes get_random_u32() to obtain<br />
random numbers for choosing CPUs. The batched_entropy_32 local lock and/or<br />
the base_crng.lock spinlock in driver/char/random.c will be acquired during<br />
the call. In PREEMPT_RT kernel, they are both sleeping locks and so cannot<br />
be acquired in atomic context.<br />
<br />
Fix this problem by using migrate_disable() to allow smp_processor_id() to<br />
be reliably used without introducing atomic context. preempt_disable() is<br />
then called after clocksource_verify_choose_cpus() but before the<br />
clocksource measurement is being run to avoid introducing unexpected<br />
latency.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.10.50 (including) | 5.10.235 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.12.17 (including) | 5.13 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.13.2 (including) | 5.15.179 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.129 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.79 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.16 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.13.4 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0fb534187d2355f6c8f995321e76d1ccd1262ac1
- https://git.kernel.org/stable/c/60f54f0d4ea530950549a8263e6fdd70a40490a4
- https://git.kernel.org/stable/c/6bb05a33337b2c842373857b63de5c9bf1ae2a09
- https://git.kernel.org/stable/c/852805b6cbdb69c298a8fc9fbe79994c95106e04
- https://git.kernel.org/stable/c/8783ceeee797d9aa9cfe150690fb9d0bac8cc459
- https://git.kernel.org/stable/c/cc3d79e7c806cb57d71c28a4a35e7d7fb3265faa
- https://git.kernel.org/stable/c/d9c217fadfcff7a8df58567517d1e4253f3fd243
- https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html
- https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html



