CVE-2025-21672 – Linux Kernel AFS Lock Holding Vulnerability

The following table lists the changes that have been made to the
CVE-2025-21672 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by 416baaa9-dc9f-4396-8d5f-8c081fb06d67

    Jan. 31, 2025

    Action Type Old Value New Value
    Added Description In the Linux kernel, the following vulnerability has been resolved:

    afs: Fix merge preference rule failure condition

    syzbot reported a lock held when returning to userspace[1]. This is
    because if argc is less than 0 and the function returns directly, the held
    inode lock is not released.

    Fix this by store the error in ret and jump to done to clean up instead of
    returning directly.

    [dh: Modified Lizhi Xu’s original patch to make it honour the error code
    from afs_split_string()]

    [1]
    WARNING: lock held when returning to user space!
    6.13.0-rc3-syzkaller-00209-g499551201b5f #0 Not tainted
    ————————————————
    syz-executor133/5823 is leaving the kernel with locks still held!
    1 lock held by syz-executor133/5823:
    #0: ffff888071cffc00 (&sb->s_type->i_mutex_key#9){++++}-{4:4}, at: inode_lock include/linux/fs.h:818 [inline]
    #0: ffff888071cffc00 (&sb->s_type->i_mutex_key#9){++++}-{4:4}, at: afs_proc_addr_prefs_write+0x2bb/0x14e0 fs/afs/addr_prefs.c:388

    Added Reference https://git.kernel.org/stable/c/17a4fde81d3a7478d97d15304a6d61094a10c2e3
    Added Reference https://git.kernel.org/stable/c/22be1d90a6211c88dd093b25d1f3aa974d0d9f9d
Share the Post:

Related Posts