CVE-2025-21727

7.8 HIGH

📋 TL;DR

This is a use-after-free vulnerability in the Linux kernel's padata subsystem that allows an attacker with local access to potentially crash the system or execute arbitrary code. It affects Linux systems using parallel cryptographic processing via the padata framework. The vulnerability occurs when cryptographic algorithms are deleted while parallel processing is still in progress.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Linux kernel versions up to and including 6.6.0+ (specific affected versions include those before the fix commits)
Operating Systems: All Linux distributions using vulnerable kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using the padata parallel processing framework, typically for cryptographic operations. Systems not using parallel crypto processing may not be vulnerable.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation to kernel-level code execution, leading to complete system compromise, data theft, or persistent backdoor installation.

🟠

Likely Case

Kernel panic or system crash causing denial of service, potentially leading to data corruption or system instability.

🟢

If Mitigated

Minimal impact if proper access controls prevent local attackers from accessing the system or if the padata subsystem is not in use.

🌐 Internet-Facing: LOW - This is a local vulnerability requiring access to the system, not directly exploitable over the network.
🏢 Internal Only: HIGH - Any local user or process could potentially exploit this vulnerability to gain elevated privileges or crash the system.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and knowledge of the padata subsystem. The vulnerability was discovered through LTP testing and can be reproduced with specific timing conditions.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Linux kernel versions with commits 0ae2f332cfd2d74cf3ce344ec9938cf3e29c3ccd or later

Vendor Advisory: https://git.kernel.org/stable/c/0ae2f332cfd2d74cf3ce344ec9938cf3e29c3ccd

Restart Required: Yes

Instructions:

1. Update to a patched Linux kernel version from your distribution's repositories. 2. Reboot the system to load the new kernel. 3. Verify the kernel version after reboot. For custom kernels, apply the fix commit and rebuild.

🔧 Temporary Workarounds

Disable padata subsystem

all

Remove or disable the padata module if not required for system functionality

modprobe -r padata
echo 'blacklist padata' >> /etc/modprobe.d/blacklist.conf

Restrict access to cryptographic operations

all

Limit which users can perform cryptographic operations that use the padata subsystem

🧯 If You Can't Patch

  • Implement strict access controls to prevent unauthorized local users from accessing the system
  • Monitor for kernel crashes or unusual system behavior that might indicate exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check kernel version with 'uname -r' and compare against affected versions. Systems using kernel versions before the fix commits are vulnerable if padata is in use.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is patched (post-fix commits) and check that system remains stable during parallel cryptographic operations.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs
  • KASAN reports of use-after-free in padata functions
  • System crashes during cryptographic operations

Network Indicators:

  • None - this is a local vulnerability

SIEM Query:

Search for kernel panic events, KASAN reports, or system crash logs mentioning padata_reorder or padata_find_next

🔗 References

📤 Share & Export