{"vulnerability": "CVE-2025-21893", "sightings": [{"uuid": "b03876cd-1a1b-4001-9fba-4847de77583c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21893", "type": "seen", "source": "https://bsky.app/profile/omo.bsky.social/post/3lmdnknr2sc2h", "content": "", "creation_timestamp": "2025-04-08T23:40:40.536095Z"}, {"uuid": "0a0536a4-a26a-4a62-b888-c0eedc8722b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21893", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9762", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-21893\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nkeys: Fix UAF in key_put()\n\nOnce a key's reference count has been reduced to 0, the garbage collector\nthread may destroy it at any time and so key_put() is not allowed to touch\nthe key after that point.  The most key_put() is normally allowed to do is\nto touch key_gc_work as that's a static global variable.\n\nHowever, in an effort to speed up the reclamation of quota, this is now\ndone in key_put() once the key's usage is reduced to 0 - but now the code\nis looking at the key after the deadline, which is forbidden.\n\nFix this by using a flag to indicate that a key can be gc'd now rather than\nlooking at the key's refcount in the garbage collector.\n\ud83d\udccf Published: 2025-03-31T19:41:46.137Z\n\ud83d\udccf Modified: 2025-03-31T19:41:46.137Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/6afe2ea2daec156bd94ad2c5a6f4f4c48240dcd3\n2. https://git.kernel.org/stable/c/f6a3cf833188e897c97028cd7b926e3f2cb1a8c0\n3. https://git.kernel.org/stable/c/75845c6c1a64483e9985302793dbf0dfa5f71e32", "creation_timestamp": "2025-03-31T20:31:08.000000Z"}, {"uuid": "bb849994-b44d-44a8-9c7c-609b31b26cb3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21893", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/114259091334934490", "content": "", "creation_timestamp": "2025-03-31T21:09:33.612289Z"}, {"uuid": "80d73c72-3618-441a-bf3b-78d8be5d4265", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21893", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/114259091334934490", "content": "", "creation_timestamp": "2025-03-31T21:09:33.631217Z"}, {"uuid": "28a97d4b-fff9-4ebc-b828-afc2423282d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21893", "type": "seen", "source": "https://t.me/cvedetector/21651", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-21893 - Linux Kernel Keyring Use After Free (UAF) Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-21893 \nPublished : March 31, 2025, 8:15 p.m. | 51\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nkeys: Fix UAF in key_put()  \n  \nOnce a key's reference count has been reduced to 0, the garbage collector  \nthread may destroy it at any time and so key_put() is not allowed to touch  \nthe key after that point.  The most key_put() is normally allowed to do is  \nto touch key_gc_work as that's a static global variable.  \n  \nHowever, in an effort to speed up the reclamation of quota, this is now  \ndone in key_put() once the key's usage is reduced to 0 - but now the code  \nis looking at the key after the deadline, which is forbidden.  \n  \nFix this by using a flag to indicate that a key can be gc'd now rather than  \nlooking at the key's refcount in the garbage collector. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-31T23:23:54.000000Z"}]}