First published: Fri Jan 31 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: zram: fix potential UAF of zram table If zram_meta_alloc failed early, it frees allocated zram->table without setting it NULL. Which will potentially cause zram_meta_free to access the table if user reset an failed and uninitialized device.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
Linux Kernel | >=6.1.122<6.1.127 | |
Linux Kernel | >=6.6.68<6.6.74 | |
Linux Kernel | >=6.12.7<6.12.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-21671 has been rated with a high severity due to the potential for a use-after-free vulnerability in the Linux kernel.
To fix CVE-2025-21671, update your Linux kernel to versions 6.1.128 or later, or apply the relevant patches provided by the Linux community.
CVE-2025-21671 affects Linux kernel versions 6.1.122 to 6.1.127, 6.6.68 to 6.6.74, and 6.12.7 to 6.12.11.
In the context of CVE-2025-21671, a use-after-free vulnerability occurs when a program continues to access memory after it has been freed, potentially leading to memory corruption.
CVE-2025-21671 could potentially allow a local user to exploit the vulnerability, but its remote exploitability depends on the specific configurations and workloads.