Skip to main content

CVE-2025-21691: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2025-21691cvecve-2025-21691
Published: Mon Feb 10 2025 (02/10/2025, 15:58:47 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: cachestat: fix page cache statistics permission checking When the 'cachestat()' system call was added in commit cf264e1329fb ("cachestat: implement cachestat syscall"), it was meant to be a much more convenient (and performant) version of mincore() that didn't need mapping things into the user virtual address space in order to work. But it ended up missing the "check for writability or ownership" fix for mincore(), done in commit 134fca9063ad ("mm/mincore.c: make mincore() more conservative"). This just adds equivalent logic to 'cachestat()', modified for the file context (rather than vma).

AI-Powered Analysis

AILast updated: 06/30/2025, 17:30:12 UTC

Technical Analysis

CVE-2025-21691 is a vulnerability identified in the Linux kernel related to the 'cachestat()' system call, which was introduced as a more efficient alternative to the 'mincore()' system call. The 'cachestat()' syscall provides page cache statistics without requiring mapping pages into the user virtual address space, improving performance and convenience. However, the initial implementation missed a critical permission check that was previously added to 'mincore()' to verify writability or ownership of the memory region. Specifically, 'mincore()' was updated to be more conservative by ensuring that the caller has the appropriate permissions to query memory mappings, preventing unauthorized information disclosure or potential privilege escalation. The vulnerability arises because 'cachestat()' lacked this permission validation, potentially allowing unprivileged users to obtain page cache statistics for files they do not own or have write access to. This could lead to unauthorized information disclosure about the system's memory usage patterns or file caching behavior. The fix involves adding equivalent permission checks to 'cachestat()', adapted for file context rather than virtual memory areas (vma), thereby enforcing proper access control. The vulnerability affects Linux kernel versions starting from the commit where 'cachestat()' was introduced (commit cf264e1329fb0307e044f7675849f9f38b44c11a). There are no known exploits in the wild at the time of publication, and no CVSS score has been assigned yet. The issue was publicly disclosed on February 10, 2025.

Potential Impact

For European organizations, this vulnerability could have several implications. Since Linux is widely used across servers, cloud infrastructure, and embedded devices in Europe, any flaw in the kernel's permission checks can potentially be leveraged by local or remote attackers with user-level access to gain unauthorized insights into system memory usage and file caching. While this vulnerability does not directly allow code execution or privilege escalation, the unauthorized information disclosure could aid attackers in crafting more targeted attacks, such as side-channel attacks or data leakage. Organizations handling sensitive data or operating critical infrastructure could be at risk if attackers use this information to map system behavior or infer confidential operational details. Additionally, multi-tenant environments like cloud service providers or hosting companies in Europe could see increased risk if unprivileged tenants exploit this to glean information about other tenants' workloads. The absence of known exploits reduces immediate risk, but the vulnerability's presence in the widely deployed Linux kernel means that timely patching is essential to prevent future exploitation.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernel to the patched versions that include the permission check fix for 'cachestat()'. Since the vulnerability stems from a missing permission validation, applying the official kernel patches or upgrading to the latest stable kernel release is the most effective mitigation. System administrators should audit their environments to identify systems running vulnerable kernel versions, especially those exposed to untrusted users or multi-tenant scenarios. Additionally, organizations should implement strict access controls to limit unprivileged user access on critical systems and monitor for unusual system call usage patterns that could indicate attempts to exploit this vulnerability. Employing kernel security modules (e.g., SELinux, AppArmor) to enforce mandatory access controls can further reduce the risk. Finally, organizations should stay informed about any emerging exploit techniques related to this vulnerability and apply security advisories promptly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-12-29T08:45:45.742Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9834c4522896dcbe9822

Added to database: 5/21/2025, 9:09:08 AM

Last enriched: 6/30/2025, 5:30:12 PM

Last updated: 8/10/2025, 4:27:34 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats