CVE-2025-40105 (GCVE-0-2025-40105)

Vulnerability from cvelistv5 – Published: 2025-10-30 09:48 – Updated: 2025-12-01 06:18
VLAI?
Summary
In the Linux kernel, the following vulnerability has been resolved: vfs: Don't leak disconnected dentries on umount When user calls open_by_handle_at() on some inode that is not cached, we will create disconnected dentry for it. If such dentry is a directory, exportfs_decode_fh_raw() will then try to connect this dentry to the dentry tree through reconnect_path(). It may happen for various reasons (such as corrupted fs or race with rename) that the call to lookup_one_unlocked() in reconnect_one() will fail to find the dentry we are trying to reconnect and instead create a new dentry under the parent. Now this dentry will not be marked as disconnected although the parent still may well be disconnected (at least in case this inconsistency happened because the fs is corrupted and .. doesn't point to the real parent directory). This creates inconsistency in disconnected flags but AFAICS it was mostly harmless. At least until commit f1ee616214cb ("VFS: don't keep disconnected dentries on d_anon") which removed adding of most disconnected dentries to sb->s_anon list. Thus after this commit cleanup of disconnected dentries implicitely relies on the fact that dput() will immediately reclaim such dentries. However when some leaf dentry isn't marked as disconnected, as in the scenario described above, the reclaim doesn't happen and the dentries are "leaked". Memory reclaim can eventually reclaim them but otherwise they stay in memory and if umount comes first, we hit infamous "Busy inodes after unmount" bug. Make sure all dentries created under a disconnected parent are marked as disconnected as well.
Severity ?
No CVSS data available.
Assigner
Impacted products
Vendor Product Version
Linux Linux Affected: f1ee616214cb22410e939d963bbb2349c2570f02 , < b5abafd0aa8d7bcb935c8f91e4cfc2f2820759e4 (git)
Affected: f1ee616214cb22410e939d963bbb2349c2570f02 , < 20863bb7fbb016379f8227122edfabc5c799bc79 (git)
Affected: f1ee616214cb22410e939d963bbb2349c2570f02 , < 8004d4b8cbf1bd68a23c160d57287e177c82cc69 (git)
Affected: f1ee616214cb22410e939d963bbb2349c2570f02 , < 7e0c8aaf4e28918abded547a5147c7d52c4af7d2 (git)
Affected: f1ee616214cb22410e939d963bbb2349c2570f02 , < cebfbf40056a4d858b2a3ca59a69936d599bd209 (git)
Affected: f1ee616214cb22410e939d963bbb2349c2570f02 , < 620f3b0ede9c5cb4976cd0457d0b04ad551e5d6b (git)
Affected: f1ee616214cb22410e939d963bbb2349c2570f02 , < eadc49999fa994d6fbd70c332bd5d5051cc42261 (git)
Affected: f1ee616214cb22410e939d963bbb2349c2570f02 , < 56094ad3eaa21e6621396cc33811d8f72847a834 (git)
Create a notification for this product.
    Linux Linux Affected: 4.16
Unaffected: 0 , < 4.16 (semver)
Unaffected: 5.4.301 , ≤ 5.4.* (semver)
Unaffected: 5.10.246 , ≤ 5.10.* (semver)
Unaffected: 5.15.196 , ≤ 5.15.* (semver)
Unaffected: 6.1.158 , ≤ 6.1.* (semver)
Unaffected: 6.6.114 , ≤ 6.6.* (semver)
Unaffected: 6.12.55 , ≤ 6.12.* (semver)
Unaffected: 6.17.5 , ≤ 6.17.* (semver)
Unaffected: 6.18 , ≤ * (original_commit_for_fix)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "fs/dcache.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "b5abafd0aa8d7bcb935c8f91e4cfc2f2820759e4",
              "status": "affected",
              "version": "f1ee616214cb22410e939d963bbb2349c2570f02",
              "versionType": "git"
            },
            {
              "lessThan": "20863bb7fbb016379f8227122edfabc5c799bc79",
              "status": "affected",
              "version": "f1ee616214cb22410e939d963bbb2349c2570f02",
              "versionType": "git"
            },
            {
              "lessThan": "8004d4b8cbf1bd68a23c160d57287e177c82cc69",
              "status": "affected",
              "version": "f1ee616214cb22410e939d963bbb2349c2570f02",
              "versionType": "git"
            },
            {
              "lessThan": "7e0c8aaf4e28918abded547a5147c7d52c4af7d2",
              "status": "affected",
              "version": "f1ee616214cb22410e939d963bbb2349c2570f02",
              "versionType": "git"
            },
            {
              "lessThan": "cebfbf40056a4d858b2a3ca59a69936d599bd209",
              "status": "affected",
              "version": "f1ee616214cb22410e939d963bbb2349c2570f02",
              "versionType": "git"
            },
            {
              "lessThan": "620f3b0ede9c5cb4976cd0457d0b04ad551e5d6b",
              "status": "affected",
              "version": "f1ee616214cb22410e939d963bbb2349c2570f02",
              "versionType": "git"
            },
            {
              "lessThan": "eadc49999fa994d6fbd70c332bd5d5051cc42261",
              "status": "affected",
              "version": "f1ee616214cb22410e939d963bbb2349c2570f02",
              "versionType": "git"
            },
            {
              "lessThan": "56094ad3eaa21e6621396cc33811d8f72847a834",
              "status": "affected",
              "version": "f1ee616214cb22410e939d963bbb2349c2570f02",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "fs/dcache.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "4.16"
            },
            {
              "lessThan": "4.16",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.301",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.246",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.196",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.158",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.114",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.12.*",
              "status": "unaffected",
              "version": "6.12.55",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.17.*",
              "status": "unaffected",
              "version": "6.17.5",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.18",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.4.301",
                  "versionStartIncluding": "4.16",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.10.246",
                  "versionStartIncluding": "4.16",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.196",
                  "versionStartIncluding": "4.16",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.158",
                  "versionStartIncluding": "4.16",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.6.114",
                  "versionStartIncluding": "4.16",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.12.55",
                  "versionStartIncluding": "4.16",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.17.5",
                  "versionStartIncluding": "4.16",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.18",
                  "versionStartIncluding": "4.16",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfs: Don\u0027t leak disconnected dentries on umount\n\nWhen user calls open_by_handle_at() on some inode that is not cached, we\nwill create disconnected dentry for it. If such dentry is a directory,\nexportfs_decode_fh_raw() will then try to connect this dentry to the\ndentry tree through reconnect_path(). It may happen for various reasons\n(such as corrupted fs or race with rename) that the call to\nlookup_one_unlocked() in reconnect_one() will fail to find the dentry we\nare trying to reconnect and instead create a new dentry under the\nparent. Now this dentry will not be marked as disconnected although the\nparent still may well be disconnected (at least in case this\ninconsistency happened because the fs is corrupted and .. doesn\u0027t point\nto the real parent directory). This creates inconsistency in\ndisconnected flags but AFAICS it was mostly harmless. At least until\ncommit f1ee616214cb (\"VFS: don\u0027t keep disconnected dentries on d_anon\")\nwhich removed adding of most disconnected dentries to sb-\u003es_anon list.\nThus after this commit cleanup of disconnected dentries implicitely\nrelies on the fact that dput() will immediately reclaim such dentries.\nHowever when some leaf dentry isn\u0027t marked as disconnected, as in the\nscenario described above, the reclaim doesn\u0027t happen and the dentries\nare \"leaked\". Memory reclaim can eventually reclaim them but otherwise\nthey stay in memory and if umount comes first, we hit infamous \"Busy\ninodes after unmount\" bug. Make sure all dentries created under a\ndisconnected parent are marked as disconnected as well."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-12-01T06:18:08.529Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/b5abafd0aa8d7bcb935c8f91e4cfc2f2820759e4"
        },
        {
          "url": "https://git.kernel.org/stable/c/20863bb7fbb016379f8227122edfabc5c799bc79"
        },
        {
          "url": "https://git.kernel.org/stable/c/8004d4b8cbf1bd68a23c160d57287e177c82cc69"
        },
        {
          "url": "https://git.kernel.org/stable/c/7e0c8aaf4e28918abded547a5147c7d52c4af7d2"
        },
        {
          "url": "https://git.kernel.org/stable/c/cebfbf40056a4d858b2a3ca59a69936d599bd209"
        },
        {
          "url": "https://git.kernel.org/stable/c/620f3b0ede9c5cb4976cd0457d0b04ad551e5d6b"
        },
        {
          "url": "https://git.kernel.org/stable/c/eadc49999fa994d6fbd70c332bd5d5051cc42261"
        },
        {
          "url": "https://git.kernel.org/stable/c/56094ad3eaa21e6621396cc33811d8f72847a834"
        }
      ],
      "title": "vfs: Don\u0027t leak disconnected dentries on umount",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2025-40105",
    "datePublished": "2025-10-30T09:48:09.674Z",
    "dateReserved": "2025-04-16T07:20:57.165Z",
    "dateUpdated": "2025-12-01T06:18:08.529Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2025-40105\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-10-30T10:15:34.880\",\"lastModified\":\"2025-10-30T15:03:13.440\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nvfs: Don\u0027t leak disconnected dentries on umount\\n\\nWhen user calls open_by_handle_at() on some inode that is not cached, we\\nwill create disconnected dentry for it. If such dentry is a directory,\\nexportfs_decode_fh_raw() will then try to connect this dentry to the\\ndentry tree through reconnect_path(). It may happen for various reasons\\n(such as corrupted fs or race with rename) that the call to\\nlookup_one_unlocked() in reconnect_one() will fail to find the dentry we\\nare trying to reconnect and instead create a new dentry under the\\nparent. Now this dentry will not be marked as disconnected although the\\nparent still may well be disconnected (at least in case this\\ninconsistency happened because the fs is corrupted and .. doesn\u0027t point\\nto the real parent directory). This creates inconsistency in\\ndisconnected flags but AFAICS it was mostly harmless. At least until\\ncommit f1ee616214cb (\\\"VFS: don\u0027t keep disconnected dentries on d_anon\\\")\\nwhich removed adding of most disconnected dentries to sb-\u003es_anon list.\\nThus after this commit cleanup of disconnected dentries implicitely\\nrelies on the fact that dput() will immediately reclaim such dentries.\\nHowever when some leaf dentry isn\u0027t marked as disconnected, as in the\\nscenario described above, the reclaim doesn\u0027t happen and the dentries\\nare \\\"leaked\\\". Memory reclaim can eventually reclaim them but otherwise\\nthey stay in memory and if umount comes first, we hit infamous \\\"Busy\\ninodes after unmount\\\" bug. Make sure all dentries created under a\\ndisconnected parent are marked as disconnected as well.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/20863bb7fbb016379f8227122edfabc5c799bc79\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/56094ad3eaa21e6621396cc33811d8f72847a834\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/620f3b0ede9c5cb4976cd0457d0b04ad551e5d6b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/7e0c8aaf4e28918abded547a5147c7d52c4af7d2\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/8004d4b8cbf1bd68a23c160d57287e177c82cc69\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/b5abafd0aa8d7bcb935c8f91e4cfc2f2820759e4\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/cebfbf40056a4d858b2a3ca59a69936d599bd209\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/eadc49999fa994d6fbd70c332bd5d5051cc42261\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…