SB2025021269 - Use-after-free in Linux kernel proc
Published: February 12, 2025 Updated: May 11, 2025
Security Bulletin ID
SB2025021269
Severity
Low
Patch available
YES
Number of vulnerabilities
1
Exploitation vector
Local access
Highest impact
Code execution
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Use-after-free (CVE-ID: CVE-2025-21694)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the __read_vmcore() function in fs/proc/vmcore.c. A local user can escalate privileges on the system.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/649b266606bc413407ce315f710c8ce8a88ee30a
- https://git.kernel.org/stable/c/65c367bd9d4f43513c7f837df5753bea9561b836
- https://git.kernel.org/stable/c/80828540dad0757b6337c6561d49c81038f38d87
- https://git.kernel.org/stable/c/80da29deb88a3a907441fc35bb7bac309f31e713
- https://git.kernel.org/stable/c/84c4ed15626574c9ac6c1039ba9c137a77bcc7f2
- https://git.kernel.org/stable/c/a5a2ee8144c3897d37403a69118c3e3dc5713958
- https://git.kernel.org/stable/c/cbc5dde0a461240046e8a41c43d7c3b76d5db952
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.234
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.177
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.290
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.127
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.12.11
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.13
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.74