Null Dereference Vulnerability in Linux Kernel Affecting Acct System Call
CVE-2025-21846

5.5MEDIUM

Key Information:

Vendor

Linux

Status
Vendor
CVE Published:
12 March 2025

What is CVE-2025-21846?

A vulnerability in the Linux kernel's acct system call can lead to a null dereference condition. This occurs when the system call is triggered to write to a file that executes an internal lookup, particularly when directed towards /sys/power/resume. If the calling task has already exited and called exit_fs(), this can result in a NULL dereference upon file access, as the current file system context becomes unreferenced. The code has been modified to ensure the final write operation is performed from the workqueue using the caller's credentials to mitigate this issue. It is recommended that this API be deprecated to avoid such security risks.

Affected Version(s)

Linux 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 8acbf4a88c6a98c8ed00afd1a7d1abcca9b4735e

Linux 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2

Linux 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 5d5b936cfa4b0d5670ca7420ef165a074bc008eb

References

CVSS V3.1

Score:
5.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.