๐Ÿ” CVE Alert

CVE-2025-38411

UNKNOWN 0.0

netfs: Fix double put of request

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: netfs: Fix double put of request If a netfs request finishes during the pause loop, it will have the ref that belongs to the IN_PROGRESS flag removed at that point - however, if it then goes to the final wait loop, that will *also* put the ref because it sees that the IN_PROGRESS flag is clear and incorrectly assumes that this happened when it called the collector. In fact, since IN_PROGRESS is clear, we shouldn't call the collector again since it's done all the cleanup, such as calling ->ki_complete(). Fix this by making netfs_collect_in_app() just return, indicating that we're done if IN_PROGRESS is removed.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Jul 25, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
329ba1cb402ac328224965b8fc7a554a5150908e < d18facba5a5795ad44b2a00a052e3db2fa77ab12 2b1424cd131cfaba4cf7040473133d26cddac088 < 9df7b5ebead649b00bf9a53a798e4bf83a1318fd
Linux / Linux
6.15.3 < 6.15.6

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/d18facba5a5795ad44b2a00a052e3db2fa77ab12 git.kernel.org: https://git.kernel.org/stable/c/9df7b5ebead649b00bf9a53a798e4bf83a1318fd