๐Ÿ” CVE Alert

CVE-2025-37978

UNKNOWN 0.0

block: integrity: Do not call set_page_dirty_lock()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: block: integrity: Do not call set_page_dirty_lock() Placing multiple protection information buffers inside the same page can lead to oopses because set_page_dirty_lock() can't be called from interrupt context. Since a protection information buffer is not backed by a file there is no point in setting its page dirty, there is nothing to synchronize. Drop the call to set_page_dirty_lock() and remove the last argument to bio_integrity_unpin_bvec().

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published May 20, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
492c5d455969fc2e829f26ed4c83487b068f0dd7 < c38a005e6efb9ddfa06bd8353b82379d6fd5d6c4 492c5d455969fc2e829f26ed4c83487b068f0dd7 < 9487fc1a10b3aa89feb24e7cedeccaaf63074617 492c5d455969fc2e829f26ed4c83487b068f0dd7 < 39e160505198ff8c158f11bce2ba19809a756e8b
Linux / Linux
6.8

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/c38a005e6efb9ddfa06bd8353b82379d6fd5d6c4 git.kernel.org: https://git.kernel.org/stable/c/9487fc1a10b3aa89feb24e7cedeccaaf63074617 git.kernel.org: https://git.kernel.org/stable/c/39e160505198ff8c158f11bce2ba19809a756e8b