Advisory Published
Updated

CVE-2025-21709: kernel: be more careful about dup_mmap() failures and uprobe registering

First published: Thu Feb 27 2025(Updated: )

In the Linux kernel, the following vulnerability has been resolved: kernel: be more careful about dup_mmap() failures and uprobe registering If a memory allocation fails during dup_mmap(), the maple tree can be left in an unsafe state for other iterators besides the exit path. All the locks are dropped before the exit_mmap() call (in mm/mmap.c), but the incomplete mm_struct can be reached through (at least) the rmap finding the vmas which have a pointer back to the mm_struct. Up to this point, there have been no issues with being able to find an mm_struct that was only partially initialised. Syzbot was able to make the incomplete mm_struct fail with recent forking changes, so it has been proven unsafe to use the mm_struct that hasn't been initialised, as referenced in the link below. Although 8ac662f5da19f ("fork: avoid inappropriate uprobe access to invalid mm") fixed the uprobe access, it does not completely remove the race. This patch sets the MMF_OOM_SKIP to avoid the iteration of the vmas on the oom side (even though this is extremely unlikely to be selected as an oom victim in the race window), and sets MMF_UNSTABLE to avoid other potential users from using a partially initialised mm_struct. When registering vmas for uprobe, skip the vmas in an mm that is marked unstable. Modifying a vma in an unstable mm may cause issues if the mm isn't fully initialised.

Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

Affected SoftwareAffected VersionHow to fix
Linux Kernel<=latest

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2025-21709?

    CVE-2025-21709 has a moderate severity level due to potential unsafe states in the maple tree structure if memory allocation fails.

  • How do I fix CVE-2025-21709?

    Fix CVE-2025-21709 by updating to the latest version of the Linux Kernel where the vulnerability has been resolved.

  • Who is affected by CVE-2025-21709?

    CVE-2025-21709 affects systems running the Linux Kernel, particularly those that may experience memory allocation failure during dup_mmap().

  • What causes the vulnerability CVE-2025-21709?

    CVE-2025-21709 is caused by improper handling of memory allocation failures in the dup_mmap() function, potentially leaving the maple tree in an unsafe state.

  • Is CVE-2025-21709 a local or remote vulnerability?

    CVE-2025-21709 is considered a local vulnerability, as it requires local access to the affected system to exploit.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203