In the Linux kernel, the following vulnerability has been resolved:
ext4: fix inode use after free in ext4_end_io_rsv_work()
In ext4_io_end_defer_completion(), check if io_end->list_vec is empty to
avoid adding an io_end that requires no conversion to the
i_rsv_conversion_list, which in turn prevents starting an unnecessary
worker. An ext4_emergency_state() check is also added to avoid attempting
to abort the journal in an emergency state.
Additionally, ext4_put_io_end_defer() is refactored to call
ext4_io_end_defer_completion() directly instead of being open-coded.
This also prevents starting an unnecessary worker when EXT4_IO_END_FAILED
is set but data_err=abort is not enabled.
This ensures that the check in ext4_put_io_end_defer() is consistent with
the check in ext4_end_bio(). Otherwise, we might add an io_end to the
i_rsv_conversion_list and then call ext4_finish_bio(), after which the
inode could be freed before ext4_end_io_rsv_work() is called, triggering
a use-after-free issue.
References
Configurations
Configuration 1 (hide)
|
History
26 Nov 2025, 19:59
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Linux
Linux linux Kernel |
|
| CWE | CWE-416 | |
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| References | () https://git.kernel.org/stable/c/469c44e66e2110054949609dde095788320139d0 - Patch | |
| References | () https://git.kernel.org/stable/c/ac999862b98a0f49e858e509f776be51406f1e77 - Patch | |
| References | () https://git.kernel.org/stable/c/c678bdc998754589cea2e6afab9401d7d8312ac4 - Patch | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
20 Aug 2025, 14:40
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
19 Aug 2025, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-08-19 17:15
Updated : 2025-11-26 19:59
NVD link : CVE-2025-38580
Mitre link : CVE-2025-38580
CVE.ORG link : CVE-2025-38580
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free
