CVE-2025-38411

In the Linux kernel, the following vulnerability has been resolved: netfs: Fix double put of request If a netfs request finishes during the pause loop, it will have the ref that belongs to the IN_PROGRESS flag removed at that point - however, if it then goes to the final wait loop, that will *also* put the ref because it sees that the IN_PROGRESS flag is clear and incorrectly assumes that this happened when it called the collector. In fact, since IN_PROGRESS is clear, we shouldn't call the collector again since it's done all the cleanup, such as calling ->ki_complete(). Fix this by making netfs_collect_in_app() just return, indicating that we're done if IN_PROGRESS is removed.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc4:*:*:*:*:*:*

History

19 Nov 2025, 18:23

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc4:*:*:*:*:*:*
CWE CWE-415
References () https://git.kernel.org/stable/c/9df7b5ebead649b00bf9a53a798e4bf83a1318fd - () https://git.kernel.org/stable/c/9df7b5ebead649b00bf9a53a798e4bf83a1318fd - Patch
References () https://git.kernel.org/stable/c/d18facba5a5795ad44b2a00a052e3db2fa77ab12 - () https://git.kernel.org/stable/c/d18facba5a5795ad44b2a00a052e3db2fa77ab12 - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

Information

Published : 2025-07-25 14:15

Updated : 2025-11-19 18:23


NVD link : CVE-2025-38411

Mitre link : CVE-2025-38411

CVE.ORG link : CVE-2025-38411


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-415

Double Free