CVE-2025-21672

5.5 MEDIUM

📋 TL;DR

A race condition vulnerability in the Linux kernel's AFS (Andrew File System) module where improper error handling can cause an inode lock to remain held when returning to userspace. This affects Linux systems using the AFS filesystem module. Attackers with local access could potentially exploit this to cause denial of service or other privilege escalation scenarios.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Kernel versions containing the vulnerable AFS code, specifically around 6.13.0-rc3 and earlier versions with the vulnerable commit.
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable if AFS filesystem module is loaded and in use. Most standard Linux installations do not use AFS by default.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation leading to full system compromise through kernel memory corruption or denial of service attacks.

🟠

Likely Case

Local denial of service through kernel panic or system instability when triggering the race condition.

🟢

If Mitigated

Minimal impact if AFS module is not loaded or not in use.

🌐 Internet-Facing: LOW - Requires local access to exploit.
🏢 Internal Only: MEDIUM - Local users or compromised accounts could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and specific conditions to trigger the race condition. Found through syzkaller fuzzing.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in kernel commit 17a4fde81d3a7478d97d15304a6d61094a10c2e3 and 22be1d90a6211c88dd093b25d1f3aa974d0d9f9d

Vendor Advisory: https://git.kernel.org/stable/c/17a4fde81d3a7478d97d15304a6d61094a10c2e3

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix. 2. Check with your distribution for backported patches. 3. Reboot system after kernel update.

🔧 Temporary Workarounds

Disable AFS module

linux

Unload the AFS kernel module if not required

sudo rmmod kafs
echo 'blacklist kafs' | sudo tee /etc/modprobe.d/blacklist-afs.conf

🧯 If You Can't Patch

  • Ensure AFS module is not loaded on production systems
  • Restrict local user access to systems where AFS is required

🔍 How to Verify

Check if Vulnerable:

Check if AFS module is loaded: lsmod | grep kafs. Check kernel version: uname -r and compare with affected versions.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is patched and AFS module version. Check kernel logs for lock warnings.

📡 Detection & Monitoring

Log Indicators:

  • Kernel warnings about locks held when returning to userspace
  • System crashes or instability related to AFS operations

Network Indicators:

  • None - local vulnerability only

SIEM Query:

source="kernel" AND "lock held when returning to user space" AND "afs"

🔗 References

📤 Share & Export