{"uuid": "0a0536a4-a26a-4a62-b888-c0eedc8722b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21893", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9762", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-21893\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nkeys: Fix UAF in key_put()\n\nOnce a key's reference count has been reduced to 0, the garbage collector\nthread may destroy it at any time and so key_put() is not allowed to touch\nthe key after that point.  The most key_put() is normally allowed to do is\nto touch key_gc_work as that's a static global variable.\n\nHowever, in an effort to speed up the reclamation of quota, this is now\ndone in key_put() once the key's usage is reduced to 0 - but now the code\nis looking at the key after the deadline, which is forbidden.\n\nFix this by using a flag to indicate that a key can be gc'd now rather than\nlooking at the key's refcount in the garbage collector.\n\ud83d\udccf Published: 2025-03-31T19:41:46.137Z\n\ud83d\udccf Modified: 2025-03-31T19:41:46.137Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/6afe2ea2daec156bd94ad2c5a6f4f4c48240dcd3\n2. https://git.kernel.org/stable/c/f6a3cf833188e897c97028cd7b926e3f2cb1a8c0\n3. https://git.kernel.org/stable/c/75845c6c1a64483e9985302793dbf0dfa5f71e32", "creation_timestamp": "2025-03-31T20:31:08.000000Z"}