CVE-2025-38620Use After Free in Linux

CWE-416Use After Free6 documents6 sources
Severity
7.8HIGHNVD
EPSS
0.0%
top 94.08%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 22

Description

In the Linux kernel, the following vulnerability has been resolved: zloop: fix KASAN use-after-free of tag set When a zoned loop device, or zloop device, is removed, KASAN enabled kernel reports "BUG KASAN use-after-free" in blk_mq_free_tag_set(). The BUG happens because zloop_ctl_remove() calls put_disk(), which invokes zloop_free_disk(). The zloop_free_disk() frees the memory allocated for the zlo pointer. However, after the memory is freed, zloop_ctl_remove() calls blk_mq_free_tag_set(&zlo-

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages6 packages

CVEListV5linux/linuxeb0570c7df23c2f32fe899fcdaf8fca9a5ecd51ec7c87046b41a9ef28ee7ac476c369da5b5228bc5+2

Patches

🔴Vulnerability Details

2
OSV
CVE-2025-38620: In the Linux kernel, the following vulnerability has been resolved: zloop: fix KASAN use-after-free of tag set When a zoned loop device, or zloop devi2025-08-22
GHSA
GHSA-hjhr-hvpq-97f6: In the Linux kernel, the following vulnerability has been resolved: zloop: fix KASAN use-after-free of tag set When a zoned loop device, or zloop de2025-08-22

📋Vendor Advisories

3
Red Hat
kernel: zloop: fix KASAN use-after-free of tag set2025-08-22
Debian
CVE-2025-38620: linux - In the Linux kernel, the following vulnerability has been resolved: zloop: fix ...2025
Microsoft
Bluetooth: HCI: Remove HCI_AMP support2024-06-11
CVE-2025-38620 — Use After Free in Linux | cvebase