Home

Description

In the Linux kernel, the following vulnerability has been resolved: ext4: fix inode use after free in ext4_end_io_rsv_work() In ext4_io_end_defer_completion(), check if io_end->list_vec is empty to avoid adding an io_end that requires no conversion to the i_rsv_conversion_list, which in turn prevents starting an unnecessary worker. An ext4_emergency_state() check is also added to avoid attempting to abort the journal in an emergency state. Additionally, ext4_put_io_end_defer() is refactored to call ext4_io_end_defer_completion() directly instead of being open-coded. This also prevents starting an unnecessary worker when EXT4_IO_END_FAILED is set but data_err=abort is not enabled. This ensures that the check in ext4_put_io_end_defer() is consistent with the check in ext4_end_bio(). Otherwise, we might add an io_end to the i_rsv_conversion_list and then call ext4_finish_bio(), after which the inode could be freed before ext4_end_io_rsv_work() is called, triggering a use-after-free issue.

PUBLISHED Reserved 2025-04-16 | Published 2025-08-19 | Updated 2025-09-29 | Assigner Linux

Product status

Default status
unaffected

ce51afb8cc5e1867ea0dfdf5e92ddbe31a1fad5d before ac999862b98a0f49e858e509f776be51406f1e77
affected

ce51afb8cc5e1867ea0dfdf5e92ddbe31a1fad5d before 469c44e66e2110054949609dde095788320139d0
affected

ce51afb8cc5e1867ea0dfdf5e92ddbe31a1fad5d before c678bdc998754589cea2e6afab9401d7d8312ac4
affected

Default status
affected

6.15
affected

Any version before 6.15
unaffected

6.15.10
unaffected

6.16.1
unaffected

6.17
unaffected

References

git.kernel.org/...c/ac999862b98a0f49e858e509f776be51406f1e77

git.kernel.org/...c/469c44e66e2110054949609dde095788320139d0

git.kernel.org/...c/c678bdc998754589cea2e6afab9401d7d8312ac4

cve.org (CVE-2025-38580)

nvd.nist.gov (CVE-2025-38580)

Download JSON