Ring Buffer Vulnerability in Linux Kernel Affects System Performance
CVE-2025-21777
Summary
A validation issue in the Linux kernel's ring buffer allows for the potential corruption of the subbuffer array metadata. This occurs when duplicates are introduced into the array without triggering a validation error. As a result, the ring buffer link list may become unstable, leading to potential data corruption. Although the situation identified did not crash the kernel immediately, the existence of duplicate entries within the writer's path poses a serious threat to system reliability and integrity. The recommended solution involves implementing a bitmask array for efficient duplicate detection and ensuring robust validation.
Affected Version(s)
Linux c76883f18e59b762247ee91d3e4224231711854e < 3ec743d558f111d8999aea24577ba66c65ee2eeb
Linux c76883f18e59b762247ee91d3e4224231711854e < 0d547a6f5e8fad26ebc12f501d7d19fccdbad6bf
Linux c76883f18e59b762247ee91d3e4224231711854e
References
Timeline
Vulnerability published
Vulnerability Reserved