We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-21893

keys: Fix UAF in key_put()



Description

In the Linux kernel, the following vulnerability has been resolved: keys: Fix UAF in key_put() Once a key's reference count has been reduced to 0, the garbage collector thread may destroy it at any time and so key_put() is not allowed to touch the key after that point. The most key_put() is normally allowed to do is to touch key_gc_work as that's a static global variable. However, in an effort to speed up the reclamation of quota, this is now done in key_put() once the key's usage is reduced to 0 - but now the code is looking at the key after the deadline, which is forbidden. Fix this by using a flag to indicate that a key can be gc'd now rather than looking at the key's refcount in the garbage collector.

Reserved 2024-12-29 | Published 2025-03-31 | Updated 2025-05-04 | Assigner Linux

Product status

Default status
unaffected

9578e327b2b4935a25d49e3891b8fcca9b6c10c6 before 6afe2ea2daec156bd94ad2c5a6f4f4c48240dcd3
affected

9578e327b2b4935a25d49e3891b8fcca9b6c10c6 before f6a3cf833188e897c97028cd7b926e3f2cb1a8c0
affected

9578e327b2b4935a25d49e3891b8fcca9b6c10c6 before 75845c6c1a64483e9985302793dbf0dfa5f71e32
affected

Default status
affected

6.10
affected

Any version before 6.10
unaffected

6.12.21
unaffected

6.13.9
unaffected

6.14
unaffected

References

git.kernel.org/...c/6afe2ea2daec156bd94ad2c5a6f4f4c48240dcd3

git.kernel.org/...c/f6a3cf833188e897c97028cd7b926e3f2cb1a8c0

git.kernel.org/...c/75845c6c1a64483e9985302793dbf0dfa5f71e32

cve.org (CVE-2025-21893)

nvd.nist.gov (CVE-2025-21893)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-21893

Support options

Helpdesk Chat, Email, Knowledgebase