Vulnerability Details CVE-2025-21893
In the Linux kernel, the following vulnerability has been resolved:
keys: Fix UAF in key_put()
Once a key's reference count has been reduced to 0, the garbage collector
thread may destroy it at any time and so key_put() is not allowed to touch
the key after that point. The most key_put() is normally allowed to do is
to touch key_gc_work as that's a static global variable.
However, in an effort to speed up the reclamation of quota, this is now
done in key_put() once the key's usage is reduced to 0 - but now the code
is looking at the key after the deadline, which is forbidden.
Fix this by using a flag to indicate that a key can be gc'd now rather than
looking at the key's refcount in the garbage collector.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 2.7%
CVSS Severity
CVSS v3 Score 7.8
Products affected by CVE-2025-21893
-
cpe:2.3:o:linux:linux_kernel:6.10
-
cpe:2.3:o:linux:linux_kernel:6.10.0
-
cpe:2.3:o:linux:linux_kernel:6.10.1
-
cpe:2.3:o:linux:linux_kernel:6.10.10
-
cpe:2.3:o:linux:linux_kernel:6.10.11
-
cpe:2.3:o:linux:linux_kernel:6.10.12
-
cpe:2.3:o:linux:linux_kernel:6.10.13
-
cpe:2.3:o:linux:linux_kernel:6.10.14
-
cpe:2.3:o:linux:linux_kernel:6.10.2
-
cpe:2.3:o:linux:linux_kernel:6.10.3
-
cpe:2.3:o:linux:linux_kernel:6.10.4
-
cpe:2.3:o:linux:linux_kernel:6.10.5
-
cpe:2.3:o:linux:linux_kernel:6.10.6
-
cpe:2.3:o:linux:linux_kernel:6.10.7
-
cpe:2.3:o:linux:linux_kernel:6.10.8
-
cpe:2.3:o:linux:linux_kernel:6.10.9
-
cpe:2.3:o:linux:linux_kernel:6.11
-
cpe:2.3:o:linux:linux_kernel:6.11.1
-
cpe:2.3:o:linux:linux_kernel:6.11.10
-
cpe:2.3:o:linux:linux_kernel:6.11.11
-
cpe:2.3:o:linux:linux_kernel:6.11.2
-
cpe:2.3:o:linux:linux_kernel:6.11.3
-
cpe:2.3:o:linux:linux_kernel:6.11.4
-
cpe:2.3:o:linux:linux_kernel:6.11.5
-
cpe:2.3:o:linux:linux_kernel:6.11.6
-
cpe:2.3:o:linux:linux_kernel:6.11.7
-
cpe:2.3:o:linux:linux_kernel:6.11.8
-
cpe:2.3:o:linux:linux_kernel:6.11.9
-
cpe:2.3:o:linux:linux_kernel:6.12
-
cpe:2.3:o:linux:linux_kernel:6.12.1
-
cpe:2.3:o:linux:linux_kernel:6.12.10
-
cpe:2.3:o:linux:linux_kernel:6.12.11
-
cpe:2.3:o:linux:linux_kernel:6.12.12
-
cpe:2.3:o:linux:linux_kernel:6.12.13
-
cpe:2.3:o:linux:linux_kernel:6.12.14
-
cpe:2.3:o:linux:linux_kernel:6.12.16
-
cpe:2.3:o:linux:linux_kernel:6.12.17
-
cpe:2.3:o:linux:linux_kernel:6.12.18
-
cpe:2.3:o:linux:linux_kernel:6.12.19
-
cpe:2.3:o:linux:linux_kernel:6.12.2
-
cpe:2.3:o:linux:linux_kernel:6.12.20
-
cpe:2.3:o:linux:linux_kernel:6.12.3
-
cpe:2.3:o:linux:linux_kernel:6.12.4
-
cpe:2.3:o:linux:linux_kernel:6.12.5
-
cpe:2.3:o:linux:linux_kernel:6.12.6
-
cpe:2.3:o:linux:linux_kernel:6.12.7
-
cpe:2.3:o:linux:linux_kernel:6.12.8
-
cpe:2.3:o:linux:linux_kernel:6.12.9
-
cpe:2.3:o:linux:linux_kernel:6.13
-
cpe:2.3:o:linux:linux_kernel:6.13.1
-
cpe:2.3:o:linux:linux_kernel:6.13.2
-
cpe:2.3:o:linux:linux_kernel:6.13.3
-
cpe:2.3:o:linux:linux_kernel:6.13.4
-
cpe:2.3:o:linux:linux_kernel:6.13.5
-
cpe:2.3:o:linux:linux_kernel:6.13.6
-
cpe:2.3:o:linux:linux_kernel:6.13.7
-
cpe:2.3:o:linux:linux_kernel:6.13.8
-
cpe:2.3:o:linux:linux_kernel:6.14