CVE-2025-21712

In the Linux kernel, the following vulnerability has been resolved: md/md-bitmap: Synchronize bitmap_get_stats() with bitmap lifetime After commit ec6bb299c7c3 ("md/md-bitmap: add 'sync_size' into struct md_bitmap_stats"), following panic is reported: Oops: general protection fault, probably for non-canonical address RIP: 0010:bitmap_get_stats+0x2b/0xa0 Call Trace: <TASK> md_seq_show+0x2d2/0x5b0 seq_read_iter+0x2b9/0x470 seq_read+0x12f/0x180 proc_reg_read+0x57/0xb0 vfs_read+0xf6/0x380 ksys_read+0x6c/0xf0 do_syscall_64+0x82/0x170 entry_SYSCALL_64_after_hwframe+0x76/0x7e Root cause is that bitmap_get_stats() can be called at anytime if mddev is still there, even if bitmap is destroyed, or not fully initialized. Deferenceing bitmap in this case can crash the kernel. Meanwhile, the above commit start to deferencing bitmap->storage, make the problem easier to trigger. Fix the problem by protecting bitmap_get_stats() with bitmap_info.mutex.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

23 Oct 2025, 13:07

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/032fa54f486eac5507976e7e31f079a767bc13a8 - () https://git.kernel.org/stable/c/032fa54f486eac5507976e7e31f079a767bc13a8 - Patch
References () https://git.kernel.org/stable/c/237e19519c8ff6949f0ef57c4a0243f5b2b0fa18 - () https://git.kernel.org/stable/c/237e19519c8ff6949f0ef57c4a0243f5b2b0fa18 - Patch
References () https://git.kernel.org/stable/c/4e9316eee3885bfb311b4759513f2ccf37891c09 - () https://git.kernel.org/stable/c/4e9316eee3885bfb311b4759513f2ccf37891c09 - Patch
References () https://git.kernel.org/stable/c/52848a095b55a302af92f52ca0de5b3112059bb8 - () https://git.kernel.org/stable/c/52848a095b55a302af92f52ca0de5b3112059bb8 - Patch
References () https://git.kernel.org/stable/c/8d28d0ddb986f56920ac97ae704cc3340a699a30 - () https://git.kernel.org/stable/c/8d28d0ddb986f56920ac97ae704cc3340a699a30 - Patch
CWE NVD-CWE-noinfo
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux
Linux linux Kernel

07 Mar 2025, 18:15

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: md/md-bitmap: sincronizar bitmap_get_stats() con el tiempo de vida del mapa de bits Después de el commit ec6bb299c7c3 ("md/md-bitmap: agregar 'sync_size' en la estructura md_bitmap_stats"), se informa el siguiente pánico: Vaya: error de protección general, probablemente para una dirección no canónica RIP: 0010:bitmap_get_stats+0x2b/0xa0 Seguimiento de llamadas: md_seq_show+0x2d2/0x5b0 seq_read_iter+0x2b9/0x470 seq_read+0x12f/0x180 proc_reg_read+0x57/0xb0 vfs_read+0xf6/0x380 ksys_read+0x6c/0xf0 La causa principal es que bitmap_get_stats() se puede llamar en cualquier momento si mddev aún está allí, incluso si bitmap se destruye o no se inicializa por completo. La deferenciación de bitmap en este caso puede hacer que el kernel se bloquee. Mientras tanto, el commit anterior comienza a deferenciar bitmap-&gt;storage, lo que hace que el problema sea más fácil de desencadenar. Solucione el problema protegiendo bitmap_get_stats() con bitmap_info.mutex.
References
  • () https://git.kernel.org/stable/c/032fa54f486eac5507976e7e31f079a767bc13a8 -

27 Feb 2025, 13:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/52848a095b55a302af92f52ca0de5b3112059bb8 -

27 Feb 2025, 02:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-27 02:15

Updated : 2025-10-23 13:07


NVD link : CVE-2025-21712

Mitre link : CVE-2025-21712

CVE.ORG link : CVE-2025-21712


JSON object : View

Products Affected

linux

  • linux_kernel