CVE-2025-38691

In the Linux kernel, the following vulnerability has been resolved: pNFS: Fix uninited ptr deref in block/scsi layout The error occurs on the third attempt to encode extents. When function ext_tree_prepare_commit() reallocates a larger buffer to retry encoding extents, the "layoutupdate_pages" page array is initialized only after the retry loop. But ext_tree_free_commitdata() is called on every iteration and tries to put pages in the array, thus dereferencing uninitialized pointers. An additional problem is that there is no limit on the maximum possible buffer_size. When there are too many extents, the client may create a layoutcommit that is larger than the maximum possible RPC size accepted by the server. During testing, we observed two typical scenarios. First, one memory page for extents is enough when we work with small files, append data to the end of the file, or preallocate extents before writing. But when we fill a new large file without preallocating, the number of extents can be huge, and counting the number of written extents in ext_tree_encode_commit() does not help much. Since this number increases even more between unlocking and locking of ext_tree, the reallocated buffer may not be large enough again and again.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

09 Jan 2026, 18:57

Type Values Removed Values Added
CWE CWE-908
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/24334f3cf8a294f253071b5bf22d754dbb6d0f2d - () https://git.kernel.org/stable/c/24334f3cf8a294f253071b5bf22d754dbb6d0f2d - Patch
References () https://git.kernel.org/stable/c/2896f101110076ac6bf99d7aaf463d61e26f89dd - () https://git.kernel.org/stable/c/2896f101110076ac6bf99d7aaf463d61e26f89dd - Patch
References () https://git.kernel.org/stable/c/37c3443a2685528f972d910a6fb87716b96fef46 - () https://git.kernel.org/stable/c/37c3443a2685528f972d910a6fb87716b96fef46 - Patch
References () https://git.kernel.org/stable/c/4f783333cbfa2ee7d4aa8e47f6bd1b3f77534fcf - () https://git.kernel.org/stable/c/4f783333cbfa2ee7d4aa8e47f6bd1b3f77534fcf - Patch
References () https://git.kernel.org/stable/c/579b85f893d9885162e1cabf99a4a088916e143e - () https://git.kernel.org/stable/c/579b85f893d9885162e1cabf99a4a088916e143e - Patch
References () https://git.kernel.org/stable/c/94ec6d939031a616474376dadbf4a8d0ef8b0bcc - () https://git.kernel.org/stable/c/94ec6d939031a616474376dadbf4a8d0ef8b0bcc - Patch
References () https://git.kernel.org/stable/c/9768797c219326699778fba9cd3b607b2f1e7950 - () https://git.kernel.org/stable/c/9768797c219326699778fba9cd3b607b2f1e7950 - Patch
References () https://git.kernel.org/stable/c/9be5c04beca3202d0a5f09fb4b2ecb644caa0bc5 - () https://git.kernel.org/stable/c/9be5c04beca3202d0a5f09fb4b2ecb644caa0bc5 - Patch
References () https://git.kernel.org/stable/c/f0b2eee3fbba9b7e3746ef698424ef5e4a197776 - () https://git.kernel.org/stable/c/f0b2eee3fbba9b7e3746ef698424ef5e4a197776 - Patch
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

03 Nov 2025, 18:16

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html -
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html -

04 Sep 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-04 16:15

Updated : 2026-01-09 18:57


NVD link : CVE-2025-38691

Mitre link : CVE-2025-38691

CVE.ORG link : CVE-2025-38691


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-908

Use of Uninitialized Resource