In the Linux kernel, the following vulnerability has been resolved:
netfs: Fix double put of request
If a netfs request finishes during the pause loop, it will have the ref
that belongs to the IN_PROGRESS flag removed at that point - however, if it
then goes to the final wait loop, that will *also* put the ref because it
sees that the IN_PROGRESS flag is clear and incorrectly assumes that this
happened when it called the collector.
In fact, since IN_PROGRESS is clear, we shouldn't call the collector again
since it's done all the cleanup, such as calling ->ki_complete().
Fix this by making netfs_collect_in_app() just return, indicating that
we're done if IN_PROGRESS is removed.
References
Configurations
Configuration 1 (hide)
|
History
19 Nov 2025, 18:23
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Linux linux Kernel
Linux |
|
| CPE | cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.16:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.16:rc4:*:*:*:*:*:* |
|
| CWE | CWE-415 | |
| References | () https://git.kernel.org/stable/c/9df7b5ebead649b00bf9a53a798e4bf83a1318fd - Patch | |
| References | () https://git.kernel.org/stable/c/d18facba5a5795ad44b2a00a052e3db2fa77ab12 - Patch | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
Information
Published : 2025-07-25 14:15
Updated : 2025-11-19 18:23
NVD link : CVE-2025-38411
Mitre link : CVE-2025-38411
CVE.ORG link : CVE-2025-38411
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-415
Double Free
