-

CVE-2025-40125

In the Linux kernel, the following vulnerability has been resolved:

blk-mq: check kobject state_in_sysfs before deleting in blk_mq_unregister_hctx

In __blk_mq_update_nr_hw_queues() the return value of
blk_mq_sysfs_register_hctxs() is not checked. If sysfs creation for hctx
fails, later changing the number of hw_queues or removing disk will
trigger the following warning:

  kernfs: can not remove 'nr_tags', no directory
  WARNING: CPU: 2 PID: 637 at fs/kernfs/dir.c:1707 kernfs_remove_by_name_ns+0x13f/0x160
  Call Trace:
   remove_files.isra.1+0x38/0xb0
   sysfs_remove_group+0x4d/0x100
   sysfs_remove_groups+0x31/0x60
   __kobject_del+0x23/0xf0
   kobject_del+0x17/0x40
   blk_mq_unregister_hctx+0x5d/0x80
   blk_mq_sysfs_unregister_hctxs+0x94/0xd0
   blk_mq_update_nr_hw_queues+0x124/0x760
   nullb_update_nr_hw_queues+0x71/0xf0 [null_blk]
   nullb_device_submit_queues_store+0x92/0x120 [null_blk]

kobjct_del() was called unconditionally even if sysfs creation failed.
Fix it by checkig the kobject creation statusbefore deleting it.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < a8c53553f1833cc2d14175d2d72cf37193a01898
Version 477e19dedc9d3e1f4443a1d4ae00572a988120ea
Status affected
Version < cc14ea21c4e658814d737ed4dedde6cd626a15ad
Version 477e19dedc9d3e1f4443a1d4ae00572a988120ea
Status affected
Version < 4b97e99b87a773d52699521d40864f3ec888e9a6
Version 477e19dedc9d3e1f4443a1d4ae00572a988120ea
Status affected
Version < 6e7dadc5763c48eb3b9b91265a21f312599ebb2c
Version 477e19dedc9d3e1f4443a1d4ae00572a988120ea
Status affected
Version < 06c4826b1d900611096e4621e93133db57e13911
Version 477e19dedc9d3e1f4443a1d4ae00572a988120ea
Status affected
Version < babc634e9fe2803962dba98a07587e835dbc0731
Version 477e19dedc9d3e1f4443a1d4ae00572a988120ea
Status affected
Version < d5ddd76ee52bdc16e9f8b1e7791291e785dab032
Version 477e19dedc9d3e1f4443a1d4ae00572a988120ea
Status affected
Version < 4c7ef92f6d4d08a27d676e4c348f4e2922cab3ed
Version 477e19dedc9d3e1f4443a1d4ae00572a988120ea
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 4.20
Status affected
Version < 4.20
Version 0
Status unaffected
Version <= 5.4.*
Version 5.4.301
Status unaffected
Version <= 5.10.*
Version 5.10.246
Status unaffected
Version <= 5.15.*
Version 5.15.195
Status unaffected
Version <= 6.1.*
Version 6.1.156
Status unaffected
Version <= 6.6.*
Version 6.6.112
Status unaffected
Version <= 6.12.*
Version 6.12.53
Status unaffected
Version <= 6.17.*
Version 6.17.3
Status unaffected
Version <= *
Version 6.18
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.06% 0.191
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String