[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2025070420-CVE-2025-38206-a077@gregkh>
Date: Fri, 4 Jul 2025 15:37:35 +0200
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...nel.org>
Subject: CVE-2025-38206: exfat: fix double free in delayed_free
From: Greg Kroah-Hartman <gregkh@...nel.org>
Description
===========
In the Linux kernel, the following vulnerability has been resolved:
exfat: fix double free in delayed_free
The double free could happen in the following path.
exfat_create_upcase_table()
exfat_create_upcase_table() : return error
exfat_free_upcase_table() : free ->vol_utbl
exfat_load_default_upcase_table : return error
exfat_kill_sb()
delayed_free()
exfat_free_upcase_table() <--------- double free
This patch set ->vol_util as NULL after freeing it.
The Linux kernel CVE team has assigned CVE-2025-38206 to this issue.
Affected and fixed versions
===========================
Fixed in 5.10.239 with commit 13d8de1b6568dcc31a95534ced16bc0c9a67bc15
Fixed in 5.15.186 with commit 66e84439ec2af776ce749e8540f8fdd257774152
Fixed in 6.15.4 with commit d3cef0e7a5c1aa6217c51faa9ce8ecac35d6e1fd
Fixed in 6.16-rc1 with commit 1f3d9724e16d62c7d42c67d6613b8512f2887c22
Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
older supported kernel versions. The official CVE entry at
https://cve.org/CVERecord/?id=CVE-2025-38206
will be updated if fixes are backported, please check that for the most
up to date information about this issue.
Affected files
==============
The file(s) affected by this issue are:
fs/exfat/nls.c
Mitigation
==========
The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes. Individual
changes are never tested alone, but rather are part of a larger kernel
release. Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all. If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
https://git.kernel.org/stable/c/13d8de1b6568dcc31a95534ced16bc0c9a67bc15
https://git.kernel.org/stable/c/66e84439ec2af776ce749e8540f8fdd257774152
https://git.kernel.org/stable/c/d3cef0e7a5c1aa6217c51faa9ce8ecac35d6e1fd
https://git.kernel.org/stable/c/1f3d9724e16d62c7d42c67d6613b8512f2887c22
Powered by blists - more mailing lists