CVE-2025-21781
27.02.2025, 03:15
In the Linux kernel, the following vulnerability has been resolved: batman-adv: fix panic during interface removal Reference counting is used to ensure that batadv_hardif_neigh_node and batadv_hard_iface are not freed before/during batadv_v_elp_throughput_metric_update work is finished. But there isn't a guarantee that the hard if will remain associated with a soft interface up until the work is finished. This fixes a crash triggered by reboot that looks like this: Call trace: batadv_v_mesh_free+0xd0/0x4dc [batman_adv] batadv_v_elp_throughput_metric_update+0x1c/0xa4 process_one_work+0x178/0x398 worker_thread+0x2e8/0x4d0 kthread+0xd8/0xdc ret_from_fork+0x10/0x20 (the batadv_v_mesh_free call is misleading, and does not actually happen) I was able to make the issue happen more reliably by changing hardif_neigh->bat_v.metric_work work to be delayed work. This allowed me to track down and confirm the fix. [sven@narfation.org: prevent entering batadv_v_elp_get_throughput without soft_iface]Enginsight
| Vendor | Product | Version |
|---|---|---|
| linux | linux_kernel | 4.6 ≤ 𝑥 < 5.4.291 |
| linux | linux_kernel | 5.5 ≤ 𝑥 < 5.10.235 |
| linux | linux_kernel | 5.11 ≤ 𝑥 < 5.15.179 |
| linux | linux_kernel | 5.16 ≤ 𝑥 < 6.1.129 |
| linux | linux_kernel | 6.2 ≤ 𝑥 < 6.6.79 |
| linux | linux_kernel | 6.7 ≤ 𝑥 < 6.12.16 |
| linux | linux_kernel | 6.13 ≤ 𝑥 < 6.13.4 |
| linux | linux_kernel | 6.14:rc1 |
| linux | linux_kernel | 6.14:rc2 |
𝑥
= Vulnerable software versions
Debian Releases
References