CVE-2025-37978

In the Linux kernel, the following vulnerability has been resolved: block: integrity: Do not call set_page_dirty_lock() Placing multiple protection information buffers inside the same page can lead to oopses because set_page_dirty_lock() can't be called from interrupt context. Since a protection information buffer is not backed by a file there is no point in setting its page dirty, there is nothing to synchronize. Drop the call to set_page_dirty_lock() and remove the last argument to bio_integrity_unpin_bvec().
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:*

History

14 Nov 2025, 17:01

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE NVD-CWE-noinfo
References () https://git.kernel.org/stable/c/39e160505198ff8c158f11bce2ba19809a756e8b - () https://git.kernel.org/stable/c/39e160505198ff8c158f11bce2ba19809a756e8b - Patch
References () https://git.kernel.org/stable/c/9487fc1a10b3aa89feb24e7cedeccaaf63074617 - () https://git.kernel.org/stable/c/9487fc1a10b3aa89feb24e7cedeccaaf63074617 - Patch
References () https://git.kernel.org/stable/c/c38a005e6efb9ddfa06bd8353b82379d6fd5d6c4 - () https://git.kernel.org/stable/c/c38a005e6efb9ddfa06bd8353b82379d6fd5d6c4 - Patch

Information

Published : 2025-05-20 17:15

Updated : 2025-11-14 17:01


NVD link : CVE-2025-37978

Mitre link : CVE-2025-37978

CVE.ORG link : CVE-2025-37978


JSON object : View

Products Affected

linux

  • linux_kernel