-
CVE-2025-38650
- EPSS 0.05%
- Published 22.08.2025 16:00:54
- Last modified 28.08.2025 15:15:57
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: hfsplus: remove mutex_lock check in hfsplus_free_extents Syzbot reported an issue in hfsplus filesystem: ------------[ cut here ]------------ WARNING: CPU: 0 PID: 4400 at fs/hfsplus/extents.c:346 hfsplus_free_extents+0x700/0xad0 Call Trace: <TASK> hfsplus_file_truncate+0x768/0xbb0 fs/hfsplus/extents.c:606 hfsplus_write_begin+0xc2/0xd0 fs/hfsplus/inode.c:56 cont_expand_zero fs/buffer.c:2383 [inline] cont_write_begin+0x2cf/0x860 fs/buffer.c:2446 hfsplus_write_begin+0x86/0xd0 fs/hfsplus/inode.c:52 generic_cont_expand_simple+0x151/0x250 fs/buffer.c:2347 hfsplus_setattr+0x168/0x280 fs/hfsplus/inode.c:263 notify_change+0xe38/0x10f0 fs/attr.c:420 do_truncate+0x1fb/0x2e0 fs/open.c:65 do_sys_ftruncate+0x2eb/0x380 fs/open.c:193 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd To avoid deadlock, Commit 31651c607151 ("hfsplus: avoid deadlock on file truncation") unlock extree before hfsplus_free_extents(), and add check wheather extree is locked in hfsplus_free_extents(). However, when operations such as hfsplus_file_release, hfsplus_setattr, hfsplus_unlink, and hfsplus_get_block are executed concurrently in different files, it is very likely to trigger the WARN_ON, which will lead syzbot and xfstest to consider it as an abnormality. The comment above this warning also describes one of the easy triggering situations, which can easily trigger and cause xfstest&syzbot to report errors. [task A] [task B] ->hfsplus_file_release ->hfsplus_file_truncate ->hfs_find_init ->mutex_lock ->mutex_unlock ->hfsplus_write_begin ->hfsplus_get_block ->hfsplus_file_extend ->hfsplus_ext_read_extent ->hfs_find_init ->mutex_lock ->hfsplus_free_extents WARN_ON(mutex_is_locked) !!! Several threads could try to lock the shared extents tree. And warning can be triggered in one thread when another thread has locked the tree. This is the wrong behavior of the code and we need to remove the warning.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
0807e4ac59a546f2346961c5e26a98901594b205
Version
31651c607151f1034cfb57e5a78678bea54c362b
Status
affected
Version <
fdd6aca652122d6e97787e88d7dd53ddc8b74e7e
Version
31651c607151f1034cfb57e5a78678bea54c362b
Status
affected
Version <
14922f0cc92e010b160121679c0a6ca072f4e975
Version
31651c607151f1034cfb57e5a78678bea54c362b
Status
affected
Version <
a19ce9230b22a0866313932e7964cf05557a6008
Version
31651c607151f1034cfb57e5a78678bea54c362b
Status
affected
Version <
084933961ecda7561dedfb78c4676ccb90c91ada
Version
31651c607151f1034cfb57e5a78678bea54c362b
Status
affected
Version <
5055b7db94110f228961dea6b74eed0a93a50b01
Version
31651c607151f1034cfb57e5a78678bea54c362b
Status
affected
Version <
9764b8bb9f5f94df105cd2ac43829dd0d2c82b9f
Version
31651c607151f1034cfb57e5a78678bea54c362b
Status
affected
Version <
314310166ba1fdff7660dfd9d18ea42d7058f7ae
Version
31651c607151f1034cfb57e5a78678bea54c362b
Status
affected
Version <
fcb96956c921f1aae7e7b477f2435c56f77a31b4
Version
31651c607151f1034cfb57e5a78678bea54c362b
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
4.19
Status
affected
Version <
4.19
Version
0
Status
unaffected
Version <=
5.4.*
Version
5.4.297
Status
unaffected
Version <=
5.10.*
Version
5.10.241
Status
unaffected
Version <=
5.15.*
Version
5.15.190
Status
unaffected
Version <=
6.1.*
Version
6.1.148
Status
unaffected
Version <=
6.6.*
Version
6.6.102
Status
unaffected
Version <=
6.12.*
Version
6.12.42
Status
unaffected
Version <=
6.15.*
Version
6.15.10
Status
unaffected
Version <=
6.16.*
Version
6.16.1
Status
unaffected
Version <=
*
Version
6.17-rc1
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.05% | 0.142 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|