CVE-2025-21893

Severity CVSS v4.0:
Pending analysis
Type:
CWE-416 Use After Free
Publication date:
31/03/2025
Last modified:
08/04/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> keys: Fix UAF in key_put()<br /> <br /> Once a key&amp;#39;s reference count has been reduced to 0, the garbage collector<br /> thread may destroy it at any time and so key_put() is not allowed to touch<br /> the key after that point. The most key_put() is normally allowed to do is<br /> to touch key_gc_work as that&amp;#39;s a static global variable.<br /> <br /> However, in an effort to speed up the reclamation of quota, this is now<br /> done in key_put() once the key&amp;#39;s usage is reduced to 0 - but now the code<br /> is looking at the key after the deadline, which is forbidden.<br /> <br /> Fix this by using a flag to indicate that a key can be gc&amp;#39;d now rather than<br /> looking at the key&amp;#39;s refcount in the garbage collector.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.10 (including) 6.12.21 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.13 (including) 6.13.9 (excluding)
cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:*