We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-21899

tracing: Fix bad hist from corrupting named_triggers list



Description

In the Linux kernel, the following vulnerability has been resolved: tracing: Fix bad hist from corrupting named_triggers list The following commands causes a crash: ~# cd /sys/kernel/tracing/events/rcu/rcu_callback ~# echo 'hist:name=bad:keys=common_pid:onmax(bogus).save(common_pid)' > trigger bash: echo: write error: Invalid argument ~# echo 'hist:name=bad:keys=common_pid' > trigger Because the following occurs: event_trigger_write() { trigger_process_regex() { event_hist_trigger_parse() { data = event_trigger_alloc(..); event_trigger_register(.., data) { cmd_ops->reg(.., data, ..) [hist_register_trigger()] { data->ops->init() [event_hist_trigger_init()] { save_named_trigger(name, data) { list_add(&data->named_list, &named_triggers); } } } } ret = create_actions(); (return -EINVAL) if (ret) goto out_unreg; [..] ret = hist_trigger_enable(data, ...) { list_add_tail_rcu(&data->list, &file->triggers); <<<---- SKIPPED!!! (this is important!) [..] out_unreg: event_hist_unregister(.., data) { cmd_ops->unreg(.., data, ..) [hist_unregister_trigger()] { list_for_each_entry(iter, &file->triggers, list) { if (!hist_trigger_match(data, iter, named_data, false)) <- never matches continue; [..] test = iter; } if (test && test->ops->free) <<<-- test is NULL test->ops->free(test) [event_hist_trigger_free()] { [..] if (data->name) del_named_trigger(data) { list_del(&data->named_list); <<<<-- NEVER gets removed! } } } } [..] kfree(data); <<<-- frees item but it is still on list The next time a hist with name is registered, it causes an u-a-f bug and the kernel can crash. Move the code around such that if event_trigger_register() succeeds, the next thing called is hist_trigger_enable() which adds it to the list. A bunch of actions is called if get_named_trigger_data() returns false. But that doesn't need to be called after event_trigger_register(), so it can be moved up, allowing event_trigger_register() to be called just before hist_trigger_enable() keeping them together and allowing the file->triggers to be properly populated.

Reserved 2024-12-29 | Published 2025-04-01 | Updated 2025-05-04 | Assigner Linux

Product status

Default status
unaffected

067fe038e70f6e64960d26a79c4df5f1413d0f13 before 5ae1b18f05ee2b849dc03b6c15d7da0c1c6efa77
affected

067fe038e70f6e64960d26a79c4df5f1413d0f13 before 43b254d46c740bf9dbe65709afa021dd726dfa99
affected

067fe038e70f6e64960d26a79c4df5f1413d0f13 before 435d2964af815aae456db554c62963b4515f19d0
affected

067fe038e70f6e64960d26a79c4df5f1413d0f13 before f1ae50cfb818ce1ac7a674406dfadb7653e2552d
affected

067fe038e70f6e64960d26a79c4df5f1413d0f13 before 6f86bdeab633a56d5c6dccf1a2c5989b6a5e323e
affected

Default status
affected

4.17
affected

Any version before 4.17
unaffected

6.1.130
unaffected

6.6.81
unaffected

6.12.18
unaffected

6.13.6
unaffected

6.14
unaffected

References

git.kernel.org/...c/5ae1b18f05ee2b849dc03b6c15d7da0c1c6efa77

git.kernel.org/...c/43b254d46c740bf9dbe65709afa021dd726dfa99

git.kernel.org/...c/435d2964af815aae456db554c62963b4515f19d0

git.kernel.org/...c/f1ae50cfb818ce1ac7a674406dfadb7653e2552d

git.kernel.org/...c/6f86bdeab633a56d5c6dccf1a2c5989b6a5e323e

cve.org (CVE-2025-21899)

nvd.nist.gov (CVE-2025-21899)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-21899

Support options

Helpdesk Chat, Email, Knowledgebase