7.8
CWE
416
Advisory Published
Updated

CVE-2025-21811: nilfs2: protect access to buffers with no active references

First published: Thu Feb 27 2025(Updated: )

In the Linux kernel, the following vulnerability has been resolved: nilfs2: protect access to buffers with no active references nilfs_lookup_dirty_data_buffers(), which iterates through the buffers attached to dirty data folios/pages, accesses the attached buffers without locking the folios/pages. For data cache, nilfs_clear_folio_dirty() may be called asynchronously when the file system degenerates to read only, so nilfs_lookup_dirty_data_buffers() still has the potential to cause use after free issues when buffers lose the protection of their dirty state midway due to this asynchronous clearing and are unintentionally freed by try_to_free_buffers(). Eliminate this race issue by adjusting the lock section in this function.

Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

Affected SoftwareAffected VersionHow to fix
Linux Kernel
Linux Kernel>=3.10<5.4.291
Linux Kernel>=5.5<5.10.235
Linux Kernel>=5.11<5.15.179
Linux Kernel>=5.16<6.1.129
Linux Kernel>=6.2<6.6.76
Linux Kernel>=6.7<6.12.13
Linux Kernel>=6.13<6.13.2

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2025-21811?

    CVE-2025-21811 has been classified with a severity level that highlights its potential risk to system stability and data integrity.

  • How do I fix CVE-2025-21811?

    To fix CVE-2025-21811, update your Linux kernel to a version that includes the applicable patches for this vulnerability.

  • What is the impact of CVE-2025-21811 on Linux kernel users?

    The impact of CVE-2025-21811 on Linux kernel users involves possible data corruption due to improper access to buffers without sufficient locking.

  • Which versions of the Linux kernel are affected by CVE-2025-21811?

    CVE-2025-21811 affects certain versions of the Linux kernel prior to the implementation of protective measures in the released patches.

  • Is there a workaround for CVE-2025-21811 until a fix is applied?

    Currently, no specific workaround is recommended for CVE-2025-21811 until an official fix has been implemented.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203