Wind River Support Network

HomeDefectsLIN1024-11071
Acknowledged

LIN1024-11071 : Security Advisory - linux - CVE-2025-38709

Created: Sep 4, 2025    Updated: Sep 8, 2025
Found In Version: 10.24.33.1
Severity: Standard
Applicable for: Wind River Linux LTS 24
Component/s: Kernel

Description

In the Linux kernel, the following vulnerability has been resolved:EOL][EOL]loop: Avoid updating block size under exclusive owner[EOL][EOL]Syzbot came up with a reproducer where a loop device block size is[EOL]changed underneath a mounted filesystem. This causes a mismatch between[EOL]the block device block size and the block size stored in the superblock[EOL]causing confusion in various places such as fs/buffer.c. The particular[EOL]issue triggered by syzbot was a warning in __getblk_slow() due to[EOL]requested buffer size not matching block device block size.[EOL][EOL]Fix the problem by getting exclusive hold of the loop device to change[EOL]its block size. This fails if somebody (such as filesystem) has already[EOL]an exclusive ownership of the block device and thus prevents modifying[EOL]the loop device under some exclusive owner which doesn't expect it.

CREATE(Triage):(User=admin) [CVE-2025-38709 (https://nvd.nist.gov/vuln/detail/CVE-2025-38709)
Live chat
Online