CVE-2025-38620

In the Linux kernel, the following vulnerability has been resolved: zloop: fix KASAN use-after-free of tag set When a zoned loop device, or zloop device, is removed, KASAN enabled kernel reports "BUG KASAN use-after-free" in blk_mq_free_tag_set(). The BUG happens because zloop_ctl_remove() calls put_disk(), which invokes zloop_free_disk(). The zloop_free_disk() frees the memory allocated for the zlo pointer. However, after the memory is freed, zloop_ctl_remove() calls blk_mq_free_tag_set(&zlo->tag_set), which accesses the freed zlo. Hence the KASAN use-after-free. zloop_ctl_remove() put_disk(zlo->disk) put_device() kobject_put() ... zloop_free_disk() kvfree(zlo) blk_mq_free_tag_set(&zlo->tag_set) To avoid the BUG, move the call to blk_mq_free_tag_set(&zlo->tag_set) from zloop_ctl_remove() into zloop_free_disk(). This ensures that the tag_set is freed before the call to kvfree(zlo).
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:6.16:*:*:*:*:*:*:*

History

26 Nov 2025, 17:45

Type Values Removed Values Added
CWE CWE-416
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/765761851d89c772f482494d452e266795460278 - () https://git.kernel.org/stable/c/765761851d89c772f482494d452e266795460278 - Patch
References () https://git.kernel.org/stable/c/c7c87046b41a9ef28ee7ac476c369da5b5228bc5 - () https://git.kernel.org/stable/c/c7c87046b41a9ef28ee7ac476c369da5b5228bc5 - Patch
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: zloop: corrección del uso tras liberación de KASAN del conjunto de etiquetas. Al eliminar un dispositivo de bucle zonificado o un dispositivo zloop, el kernel habilitado para KASAN informa "BUG KASAN use after-free" en blk_mq_free_tag_set(). El error se produce porque zloop_ctl_remove() llama a put_disk(), que a su vez invoca zloop_free_disk(). zloop_free_disk() libera la memoria asignada al puntero zloop. Sin embargo, una vez liberada la memoria, zloop_ctl_remove() llama a blk_mq_free_tag_set(&zlo->tag_set), que accede al puntero zloop liberado. De ahí use-after-free de KASAN. Para evitar el error, mueva la llamada a blk_mq_free_tag_set(&zlo->tag_set) de zloop_ctl_remove() a zloop_free_disk(). Esto garantiza que el conjunto de etiquetas se libere antes de la llamada a kvfree(zlo).
CPE cpe:2.3:o:linux:linux_kernel:6.16:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

22 Aug 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-22 16:15

Updated : 2025-11-26 17:45


NVD link : CVE-2025-38620

Mitre link : CVE-2025-38620

CVE.ORG link : CVE-2025-38620


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free