First published: Mon Feb 10 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: cachestat: fix page cache statistics permission checking When the 'cachestat()' system call was added in commit cf264e1329fb ("cachestat: implement cachestat syscall"), it was meant to be a much more convenient (and performant) version of mincore() that didn't need mapping things into the user virtual address space in order to work. But it ended up missing the "check for writability or ownership" fix for mincore(), done in commit 134fca9063ad ("mm/mincore.c: make mincore() more conservative"). This just adds equivalent logic to 'cachestat()', modified for the file context (rather than vma).
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.135-1 6.12.22-1 6.12.25-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-21691 has been classified with a medium severity level due to possible permission issues in the page cache statistics.
To fix CVE-2025-21691, update your Linux kernel to the latest stable version that includes the patch for this vulnerability.
CVE-2025-21691 affects the Linux kernel, specifically versions that include the 'cachestat()' system call.
CVE-2025-21691 involves improper permission checking in the 'cachestat()' system call, which could lead to unauthorized access to cache statistics.
CVE-2025-21691 was reported following the implementation of the 'cachestat()' system call in the Linux kernel.