Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: nilfs2: protect access to buffers with no active references nilfs_lookup_dirty_data_buffers(), which iterates through the buffers attached to dirty data folios/pages, accesses the attached buffers without locking the folios/pages. For data cache, nilfs_clear_folio_dirty() may be called asynchronously when the file system degenerates to read only, so nilfs_lookup_dirty_data_buffers() still has the potential to cause use after free issues when buffers lose the protection of their dirty state midway due to this asynchronous clearing and are unintentionally freed by try_to_free_buffers(). Eliminate this race issue by adjusting the lock section in this function.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 3.10, < 5.4.291 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/367a9bffabe08c04f6d725032cce3d891b2b9e1aPatch
- https://git.kernel.org/stable/c/4b08d23d7d1917bef4fbee8ad81372f49b006656Patch
- https://git.kernel.org/stable/c/58c27fa7a610b6e8d44e6220e7dbddfbaccaf439Patch
- https://git.kernel.org/stable/c/72cf688d0ce7e642b12ddc9b2a42524737ec1b4aPatch
- https://git.kernel.org/stable/c/8e1b9201c9a24638cf09c6e1c9f224157328010bPatch
- https://git.kernel.org/stable/c/c437dfac9f7a5a46ac2a5e6d6acd3059e9f68188Patch
- https://git.kernel.org/stable/c/d8ff250e085a4c4cdda4ad1cdd234ed110393143Patch
- https://git.kernel.org/stable/c/e1fc4a90a90ea8514246c45435662531975937d9Patch
- https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html
- https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html
FAQ
What is CVE-2025-21811?
CVE-2025-21811 is a vulnerability with a CVSS score of 7.8 (HIGH). In the Linux kernel, the following vulnerability has been resolved: nilfs2: protect access to buffers with no active references nilfs_lookup_dirty_data_buffers(), which iterates through the buffers ...
How severe is CVE-2025-21811?
CVE-2025-21811 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-21811?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.