We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-37978

block: integrity: Do not call set_page_dirty_lock()



Description

In the Linux kernel, the following vulnerability has been resolved: block: integrity: Do not call set_page_dirty_lock() Placing multiple protection information buffers inside the same page can lead to oopses because set_page_dirty_lock() can't be called from interrupt context. Since a protection information buffer is not backed by a file there is no point in setting its page dirty, there is nothing to synchronize. Drop the call to set_page_dirty_lock() and remove the last argument to bio_integrity_unpin_bvec().

Reserved 2025-04-16 | Published 2025-05-20 | Updated 2025-05-26 | Assigner Linux

Product status

Default status
unaffected

492c5d455969fc2e829f26ed4c83487b068f0dd7 before c38a005e6efb9ddfa06bd8353b82379d6fd5d6c4
affected

492c5d455969fc2e829f26ed4c83487b068f0dd7 before 9487fc1a10b3aa89feb24e7cedeccaaf63074617
affected

492c5d455969fc2e829f26ed4c83487b068f0dd7 before 39e160505198ff8c158f11bce2ba19809a756e8b
affected

Default status
affected

6.8
affected

Any version before 6.8
unaffected

6.12.25
unaffected

6.14.4
unaffected

6.15
unaffected

References

git.kernel.org/...c/c38a005e6efb9ddfa06bd8353b82379d6fd5d6c4

git.kernel.org/...c/9487fc1a10b3aa89feb24e7cedeccaaf63074617

git.kernel.org/...c/39e160505198ff8c158f11bce2ba19809a756e8b

cve.org (CVE-2025-37978)

nvd.nist.gov (CVE-2025-37978)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-37978

Support options

Helpdesk Chat, Email, Knowledgebase