We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-38411

netfs: Fix double put of request



Description

In the Linux kernel, the following vulnerability has been resolved: netfs: Fix double put of request If a netfs request finishes during the pause loop, it will have the ref that belongs to the IN_PROGRESS flag removed at that point - however, if it then goes to the final wait loop, that will *also* put the ref because it sees that the IN_PROGRESS flag is clear and incorrectly assumes that this happened when it called the collector. In fact, since IN_PROGRESS is clear, we shouldn't call the collector again since it's done all the cleanup, such as calling ->ki_complete(). Fix this by making netfs_collect_in_app() just return, indicating that we're done if IN_PROGRESS is removed.

Reserved 2025-04-16 | Published 2025-07-25 | Updated 2025-07-25 | Assigner Linux

Product status

Default status
unaffected

329ba1cb402ac328224965b8fc7a554a5150908e before d18facba5a5795ad44b2a00a052e3db2fa77ab12
affected

2b1424cd131cfaba4cf7040473133d26cddac088 before 9df7b5ebead649b00bf9a53a798e4bf83a1318fd
affected

Default status
affected

6.16-rc1
affected

Any version before 6.16-rc1
unaffected

6.15.6
unaffected

6.16-rc5
unaffected

References

git.kernel.org/...c/d18facba5a5795ad44b2a00a052e3db2fa77ab12

git.kernel.org/...c/9df7b5ebead649b00bf9a53a798e4bf83a1318fd

cve.org (CVE-2025-38411)

nvd.nist.gov (CVE-2025-38411)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-38411

Support options

Helpdesk Chat, Email, Knowledgebase