{"uuid": "5c69d7cb-e5e1-4d7f-b3cd-8943df4c97cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21672", "type": "seen", "source": "https://t.me/cvedetector/16944", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-21672 - Linux Kernel AFS Lock Holding Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-21672 \nPublished : Jan. 31, 2025, 12:15 p.m. | 1\u00a0hour, 34\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nafs: Fix merge preference rule failure condition  \n  \nsyzbot reported a lock held when returning to userspace[1].  This is  \nbecause if argc is less than 0 and the function returns directly, the held  \ninode lock is not released.  \n  \nFix this by store the error in ret and jump to done to clean up instead of  \nreturning directly.  \n  \n[dh: Modified Lizhi Xu's original patch to make it honour the error code  \nfrom afs_split_string()]  \n  \n[1]  \nWARNING: lock held when returning to user space!  \n6.13.0-rc3-syzkaller-00209-g499551201b5f #0 Not tainted  \n------------------------------------------------  \nsyz-executor133/5823 is leaving the kernel with locks still held!  \n1 lock held by syz-executor133/5823:  \n #0: ffff888071cffc00 (&amp;sb-&gt;s_type-&gt;i_mutex_key#9){++++}-{4:4}, at: inode_lock include/linux/fs.h:818 [inline]  \n #0: ffff888071cffc00 (&amp;sb-&gt;s_type-&gt;i_mutex_key#9){++++}-{4:4}, at: afs_proc_addr_prefs_write+0x2bb/0x14e0 fs/afs/addr_prefs.c:388 \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-31T15:22:42.000000Z"}