CVE-2025-21664

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-21664
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-21664.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-21664
Downstream
Related
Published
2025-01-21T12:18:19.015Z
Modified
2025-11-28T02:33:57.222330Z
Summary
dm thin: make get_first_thin use rcu-safe list first function
Details

In the Linux kernel, the following vulnerability has been resolved:

dm thin: make getfirstthin use rcu-safe list first function

The documentation in rculist.h explains the absence of listemptyrcu() and cautions programmers against relying on a listempty() -> listfirst() sequence in RCU safe code. This is because each of these functions performs its own READONCE() of the list head. This can lead to a situation where the listempty() sees a valid list entry, but the subsequent list_first() sees a different view of list head state after a modification.

In the case of dm-thin, this author had a production box crash from a GP fault in the processdeferredbios path. This function saw a valid list head in getfirstthin() but when it subsequently dereferenced that and turned it into a thinc, it got the inside of the struct pool, since the list was now empty and referring to itself. The kernel on which this occurred printed both a warning about a refcountt being saturated, and a UBSAN error for an out-of-bounds cpuid access in the queued spinlock, prior to the fault itself. When the resulting kdump was examined, it was possible to see another thread patiently waiting in thindtr's synchronizercu.

The thindtr call managed to pull the thinc out of the active thins list (and have it be the last entry in the active_thins list) at just the wrong moment which lead to this crash.

Fortunately, the fix here is straight forward. Switch getfirstthin() function to use listfirstornullrcu() which performs just a single READ_ONCE() and returns NULL if the list is already empty.

This was run against the devicemapper test suite's thin-provisioning suites for delete and suspend and no regressions were observed.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21664.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
b10ebd34cccae1b431caf1be54919aede2be7cbe
Fixed
ec037fe8c0d0f6140e3d8a49c7b29cb5582160b8
Fixed
cd30a3960433ec2db94b3689752fa3c5df44d649
Fixed
802666a40c71a23542c43a3f87e3a2d0f4e8fe45
Fixed
12771050b6d059eea096993bf2001da9da9fddff
Fixed
6b305e98de0d225ccebfb225730a9f560d28ecb0
Fixed
cbd0d5ecfa390ac29c5380200147d09c381b2ac6
Fixed
80f130bfad1dab93b95683fc39b87235682b8f72

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
3.15.0
Fixed
5.4.290
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.234
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.177
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.125
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.72
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.10