CVE-2025-38620
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
22/08/2025
Last modified:
26/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
zloop: fix KASAN use-after-free of tag set<br />
<br />
When a zoned loop device, or zloop device, is removed, KASAN enabled<br />
kernel reports "BUG KASAN use-after-free" in blk_mq_free_tag_set(). The<br />
BUG happens because zloop_ctl_remove() calls put_disk(), which invokes<br />
zloop_free_disk(). The zloop_free_disk() frees the memory allocated for<br />
the zlo pointer. However, after the memory is freed, zloop_ctl_remove()<br />
calls blk_mq_free_tag_set(&zlo->tag_set), which accesses the freed zlo.<br />
Hence the KASAN use-after-free.<br />
<br />
zloop_ctl_remove()<br />
put_disk(zlo->disk)<br />
put_device()<br />
kobject_put()<br />
...<br />
zloop_free_disk()<br />
kvfree(zlo)<br />
blk_mq_free_tag_set(&zlo->tag_set)<br />
<br />
To avoid the BUG, move the call to blk_mq_free_tag_set(&zlo->tag_set)<br />
from zloop_ctl_remove() into zloop_free_disk(). This ensures that<br />
the tag_set is freed before the call to kvfree(zlo).
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:6.16:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



