Use-after-free in Linux kernel - CVE-2025-22126
Published: April 22, 2025 / Updated: May 11, 2025
Linux kernel
Detailed vulnerability description
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the __mddev_put(), md_seq_show(), EXPORT_SYMBOL_GPL(), md_notify_reboot(), md_autostart_arrays() and md_exit() functions in drivers/md/md.c. A local user can escalate privileges on the system.
How to mitigate CVE-2025-22126
Sources
- https://git.kernel.org/stable/c/5462544ccbad3fc938a71b01fa5bd3a0dc2b750a
- https://git.kernel.org/stable/c/8542870237c3a48ff049b6c5df5f50c8728284fa
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.135
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.12.25
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.14.2
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.88