CVE-2025-21887
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
27/03/2025
Last modified:
01/04/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ovl: fix UAF in ovl_dentry_update_reval by moving dput() in ovl_link_up<br />
<br />
The issue was caused by dput(upper) being called before<br />
ovl_dentry_update_reval(), while upper->d_flags was still<br />
accessed in ovl_dentry_remote().<br />
<br />
Move dput(upper) after its last use to prevent use-after-free.<br />
<br />
BUG: KASAN: slab-use-after-free in ovl_dentry_remote fs/overlayfs/util.c:162 [inline]<br />
BUG: KASAN: slab-use-after-free in ovl_dentry_update_reval+0xd2/0xf0 fs/overlayfs/util.c:167<br />
<br />
Call Trace:<br />
<br />
__dump_stack lib/dump_stack.c:88 [inline]<br />
dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:114<br />
print_address_description mm/kasan/report.c:377 [inline]<br />
print_report+0xc3/0x620 mm/kasan/report.c:488<br />
kasan_report+0xd9/0x110 mm/kasan/report.c:601<br />
ovl_dentry_remote fs/overlayfs/util.c:162 [inline]<br />
ovl_dentry_update_reval+0xd2/0xf0 fs/overlayfs/util.c:167<br />
ovl_link_up fs/overlayfs/copy_up.c:610 [inline]<br />
ovl_copy_up_one+0x2105/0x3490 fs/overlayfs/copy_up.c:1170<br />
ovl_copy_up_flags+0x18d/0x200 fs/overlayfs/copy_up.c:1223<br />
ovl_rename+0x39e/0x18c0 fs/overlayfs/dir.c:1136<br />
vfs_rename+0xf84/0x20a0 fs/namei.c:4893<br />
...<br />
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.10.188 (including) | 5.11 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.15.121 (including) | 5.15.179 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.1.39 (including) | 6.1.130 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.3.13 (including) | 6.4 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.4.4 (including) | 6.6.81 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.18 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.13.6 (excluding) |
cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/3594aad97e7be2557ca9fa9c931b206b604028c8
- https://git.kernel.org/stable/c/4b49d939b5a79117f939b77cc67efae2694d9799
- https://git.kernel.org/stable/c/60b4b5c1277fc491da9e1e7abab307bfa39c2db7
- https://git.kernel.org/stable/c/64455c8051c3aedc71abb7ec8d47c80301f99f00
- https://git.kernel.org/stable/c/a7c41830ffcd17b2177a95a9b99b270302090c35
- https://git.kernel.org/stable/c/c84e125fff2615b4d9c259e762596134eddd2f27