-
CVE-2025-38411
- EPSS 0.03%
- Veröffentlicht 25.07.2025 14:15:32
- Zuletzt bearbeitet 25.07.2025 15:29:19
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: netfs: Fix double put of request If a netfs request finishes during the pause loop, it will have the ref that belongs to the IN_PROGRESS flag removed at that point - however, if it then goes to the final wait loop, that will *also* put the ref because it sees that the IN_PROGRESS flag is clear and incorrectly assumes that this happened when it called the collector. In fact, since IN_PROGRESS is clear, we shouldn't call the collector again since it's done all the cleanup, such as calling ->ki_complete(). Fix this by making netfs_collect_in_app() just return, indicating that we're done if IN_PROGRESS is removed.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
d18facba5a5795ad44b2a00a052e3db2fa77ab12
Version
329ba1cb402ac328224965b8fc7a554a5150908e
Status
affected
Version <
9df7b5ebead649b00bf9a53a798e4bf83a1318fd
Version
2b1424cd131cfaba4cf7040473133d26cddac088
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
6.15.6
Version
6.15.3
Status
affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.03% | 0.064 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|