Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2025-06548

Опубликовано: 21 янв. 2025
Источник: fstec
CVSS3: 7.8
CVSS2: 6.8
EPSS Низкий

Описание

Уязвимость компонента dm thin ядра операционной системы Linux связана с чтением памяти за пределами выделенного буфера в функции get_first_thin() в drivers/md/dm-thin.c. Эксплуатация уязвимости может позволить нарушителю вызвать отказ в обслуживании

Вендор

Novell Inc.
Сообщество свободного программного обеспечения
ООО «Ред Софт»
Red Hat Inc.

Наименование ПО

SUSE Linux Enterprise Live Patching
Debian GNU/Linux
РЕД ОС
Red Hat Enterprise Linux
Suse Linux Enterprise Desktop
Suse Linux Enterprise Server
SUSE Linux Enterprise Server for SAP Applications
SUSE Linux Enterprise High Performance Computing
SUSE Linux Enterprise Module for Basesystem
SUSE Linux Enterprise Workstation Extension
OpenSUSE Leap
SUSE Linux Enterprise Module for Development Tools
SUSE Linux Enterprise Micro
SUSE Linux Enterprise High Availability Extension
SUSE Linux Enterprise Module for Public Cloud
SUSE Linux Enterprise Real Time
SUSE Real Time Module
SUSE Linux Enterprise Module for Confidential Computing Technical Preview
Linux
SUSE Linux Enterprise Module for Legacy

Версия ПО

12 SP5 (SUSE Linux Enterprise Live Patching)
11 (Debian GNU/Linux)
12 (Debian GNU/Linux)
7.3 (РЕД ОС)
9 (Red Hat Enterprise Linux)
15 SP6 (Suse Linux Enterprise Desktop)
15 SP6 (Suse Linux Enterprise Server)
15 SP6 (SUSE Linux Enterprise Server for SAP Applications)
15 SP6 (SUSE Linux Enterprise High Performance Computing)
15 SP6 (SUSE Linux Enterprise Module for Basesystem)
15 SP6 (SUSE Linux Enterprise Workstation Extension)
15.6 (OpenSUSE Leap)
15 SP6 (SUSE Linux Enterprise Module for Development Tools)
6.0 (SUSE Linux Enterprise Micro)
15 SP6 (SUSE Linux Enterprise High Availability Extension)
15 SP6 (SUSE Linux Enterprise Live Patching)
15 SP6 (SUSE Linux Enterprise Module for Public Cloud)
15 SP6 (SUSE Linux Enterprise Real Time)
15 SP6 (SUSE Real Time Module)
12 SP5-LTSS (Suse Linux Enterprise Server)
12 SP5 LTSS Extended Security (Suse Linux Enterprise Server)
15 SP6 (SUSE Linux Enterprise Module for Confidential Computing Technical Preview)
6.1 (SUSE Linux Enterprise Micro)
до 6.13 (Linux)
15 SP6 (SUSE Linux Enterprise Module for Legacy)
от 6.12 до 6.12.10 (Linux)
от 6.6 до 6.6.72 (Linux)
от 3.15 до 6.1.125 (Linux)

Тип ПО

Прикладное ПО информационных систем
Операционная система

Операционные системы и аппаратные платформы

Сообщество свободного программного обеспечения Debian GNU/Linux 11
Сообщество свободного программного обеспечения Debian GNU/Linux 12
ООО «Ред Софт» РЕД ОС 7.3
Red Hat Inc. Red Hat Enterprise Linux 9
Novell Inc. Suse Linux Enterprise Desktop 15 SP6
Novell Inc. Suse Linux Enterprise Server 15 SP6
Novell Inc. SUSE Linux Enterprise Server for SAP Applications 15 SP6
Novell Inc. OpenSUSE Leap 15.6
Novell Inc. SUSE Linux Enterprise Real Time 15 SP6
Novell Inc. Suse Linux Enterprise Server 12 SP5-LTSS
Novell Inc. Suse Linux Enterprise Server 12 SP5 LTSS Extended Security
Сообщество свободного программного обеспечения Linux до 6.13
Сообщество свободного программного обеспечения Linux от 6.12 до 6.12.10
Сообщество свободного программного обеспечения Linux от 6.6 до 6.6.72
Сообщество свободного программного обеспечения Linux от 3.15 до 6.1.125

Уровень опасности уязвимости

Средний уровень опасности (базовая оценка CVSS 2.0 составляет 6,8)
Высокий уровень опасности (базовая оценка CVSS 3.1 составляет 7,8)

Возможные меры по устранению уязвимости

В условиях отсутствия обновлений безопасности от производителя рекомендуется придерживаться "Рекомендаций по безопасной настройке операционных систем LINUX", изложенных в методическом документе ФСТЭК России, утверждённом 25 декабря 2022 года.
Использование рекомендаций:
Для Linux:
https://lore.kernel.org/linux-cve-announce/2025012135-CVE-2025-21664-3744@gregkh/
https://git.kernel.org/stable/c/12771050b6d059eea096993bf2001da9da9fddff https://git.kernel.org/stable/c/6b305e98de0d225ccebfb225730a9f560d28ecb0 https://git.kernel.org/stable/c/802666a40c71a23542c43a3f87e3a2d0f4e8fe45 https://git.kernel.org/stable/c/80f130bfad1dab93b95683fc39b87235682b8f72 https://git.kernel.org/stable/c/cbd0d5ecfa390ac29c5380200147d09c381b2ac6 https://git.kernel.org/stable/c/cd30a3960433ec2db94b3689752fa3c5df44d649 https://git.kernel.org/stable/c/ec037fe8c0d0f6140e3d8a49c7b29cb5582160b8
Для РедОС:
https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-140525/?sphrase_id=966672
Для Debian GNU/Linux:
https://security-tracker.debian.org/tracker/CVE-2025-21664
Для программных продуктов Novell Inc.:
https://www.suse.com/pt-br/security/cve/CVE-2025-21664.html
Для программных продуктов Red Hat Inc.:
Компенсирующие меры:
- минимизация пользовательских привилегий;
- отключение/удаление неиспользуемых учётных записей пользователей;
- контроль журналов аудита кластера для отслеживания попыток эксплуатации уязвимости.

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 28%
0.00094
Низкий

7.8 High

CVSS3

6.8 Medium

CVSS2

Связанные уязвимости

ubuntu
5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: dm thin: make get_first_thin use rcu-safe list first function The documentation in rculist.h explains the absence of list_empty_rcu() and cautions programmers against relying on a list_empty() -> list_first() sequence in RCU safe code. This is because each of these functions performs its own READ_ONCE() of the list head. This can lead to a situation where the list_empty() sees a valid list entry, but the subsequent list_first() sees a different view of list head state after a modification. In the case of dm-thin, this author had a production box crash from a GP fault in the process_deferred_bios path. This function saw a valid list head in get_first_thin() but when it subsequently dereferenced that and turned it into a thin_c, it got the inside of the struct pool, since the list was now empty and referring to itself. The kernel on which this occurred printed both a warning about a refcount_t being saturated, ...

CVSS3: 4.4
redhat
5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: dm thin: make get_first_thin use rcu-safe list first function The documentation in rculist.h explains the absence of list_empty_rcu() and cautions programmers against relying on a list_empty() -> list_first() sequence in RCU safe code. This is because each of these functions performs its own READ_ONCE() of the list head. This can lead to a situation where the list_empty() sees a valid list entry, but the subsequent list_first() sees a different view of list head state after a modification. In the case of dm-thin, this author had a production box crash from a GP fault in the process_deferred_bios path. This function saw a valid list head in get_first_thin() but when it subsequently dereferenced that and turned it into a thin_c, it got the inside of the struct pool, since the list was now empty and referring to itself. The kernel on which this occurred printed both a warning about a refcount_t being saturated, and...

nvd
5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: dm thin: make get_first_thin use rcu-safe list first function The documentation in rculist.h explains the absence of list_empty_rcu() and cautions programmers against relying on a list_empty() -> list_first() sequence in RCU safe code. This is because each of these functions performs its own READ_ONCE() of the list head. This can lead to a situation where the list_empty() sees a valid list entry, but the subsequent list_first() sees a different view of list head state after a modification. In the case of dm-thin, this author had a production box crash from a GP fault in the process_deferred_bios path. This function saw a valid list head in get_first_thin() but when it subsequently dereferenced that and turned it into a thin_c, it got the inside of the struct pool, since the list was now empty and referring to itself. The kernel on which this occurred printed both a warning about a refcount_t being saturated, and

debian
5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: d ...

github
5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: dm thin: make get_first_thin use rcu-safe list first function The documentation in rculist.h explains the absence of list_empty_rcu() and cautions programmers against relying on a list_empty() -> list_first() sequence in RCU safe code. This is because each of these functions performs its own READ_ONCE() of the list head. This can lead to a situation where the list_empty() sees a valid list entry, but the subsequent list_first() sees a different view of list head state after a modification. In the case of dm-thin, this author had a production box crash from a GP fault in the process_deferred_bios path. This function saw a valid list head in get_first_thin() but when it subsequently dereferenced that and turned it into a thin_c, it got the inside of the struct pool, since the list was now empty and referring to itself. The kernel on which this occurred printed both a warning about a refcount_t being saturated, ...

EPSS

Процентиль: 28%
0.00094
Низкий

7.8 High

CVSS3

6.8 Medium

CVSS2

Уязвимость BDU:2025-06548