CVE-2025-21853
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
12/03/2025
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
bpf: avoid holding freeze_mutex during mmap operation<br />
<br />
We use map->freeze_mutex to prevent races between map_freeze() and<br />
memory mapping BPF map contents with writable permissions. The way we<br />
naively do this means we&#39;ll hold freeze_mutex for entire duration of all<br />
the mm and VMA manipulations, which is completely unnecessary. This can<br />
potentially also lead to deadlocks, as reported by syzbot in [0].<br />
<br />
So, instead, hold freeze_mutex only during writeability checks, bump<br />
(proactively) "write active" count for the map, unlock the mutex and<br />
proceed with mmap logic. And only if something went wrong during mmap<br />
logic, then undo that "write active" counter increment.<br />
<br />
[0] https://lore.kernel.org/bpf/678dcbc9.050a0220.303755.0066.GAE@google.com/
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 6.6.80 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.17 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.13.5 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0d90d9e154144a3a80e9fc0eb9b21b7fc990f68f
- https://git.kernel.org/stable/c/271e49f8a58edba65bc2b1250a0abaa98c4bfdbe
- https://git.kernel.org/stable/c/29cfda62ab4d92ab94123813db49ab76c1e61b29
- https://git.kernel.org/stable/c/2ce31c97c219b4fe797749f950274f246eb88c49
- https://git.kernel.org/stable/c/4759acbd44d24a69b7b14848012ec4201d6c5501
- https://git.kernel.org/stable/c/bc27c52eea189e8f7492d40739b7746d67b65beb
- https://git.kernel.org/stable/c/d95607a5f2f9bb08194c9deaf4a5f3e8ba59a9d4
- https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html
- https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html



