The following table lists the changes that have been made to the
CVE-2025-21672 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.
-
New CVE Received
by 416baaa9-dc9f-4396-8d5f-8c081fb06d67Jan. 31, 2025
Action Type Old Value New Value Added Description In the Linux kernel, the following vulnerability has been resolved: afs: Fix merge preference rule failure condition
syzbot reported a lock held when returning to userspace[1]. This is
because if argc is less than 0 and the function returns directly, the held
inode lock is not released.Fix this by store the error in ret and jump to done to clean up instead of
returning directly.[dh: Modified Lizhi Xu’s original patch to make it honour the error code
from afs_split_string()][1]
WARNING: lock held when returning to user space!
6.13.0-rc3-syzkaller-00209-g499551201b5f #0 Not tainted
————————————————
syz-executor133/5823 is leaving the kernel with locks still held!
1 lock held by syz-executor133/5823:
#0: ffff888071cffc00 (&sb->s_type->i_mutex_key#9){++++}-{4:4}, at: inode_lock include/linux/fs.h:818 [inline]
#0: ffff888071cffc00 (&sb->s_type->i_mutex_key#9){++++}-{4:4}, at: afs_proc_addr_prefs_write+0x2bb/0x14e0 fs/afs/addr_prefs.c:388Added Reference https://git.kernel.org/stable/c/17a4fde81d3a7478d97d15304a6d61094a10c2e3 Added Reference https://git.kernel.org/stable/c/22be1d90a6211c88dd093b25d1f3aa974d0d9f9d