Bug 2373344 (CVE-2025-38058) - CVE-2025-38058 kernel: __legitimize_mnt(): check for MNT_SYNC_UMOUNT should be under mount_lock
Summary: CVE-2025-38058 kernel: __legitimize_mnt(): check for MNT_SYNC_UMOUNT should b...
Keywords:
Status: NEW
Alias: CVE-2025-38058
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-06-18 10:02 UTC by OSIDB Bzimport
Modified: 2025-06-20 21:06 UTC (History)
4 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-06-18 10:02:40 UTC
In the Linux kernel, the following vulnerability has been resolved:

__legitimize_mnt(): check for MNT_SYNC_UMOUNT should be under mount_lock

... or we risk stealing final mntput from sync umount - raising mnt_count
after umount(2) has verified that victim is not busy, but before it
has set MNT_SYNC_UMOUNT; in that case __legitimize_mnt() doesn't see
that it's safe to quietly undo mnt_count increment and leaves dropping
the reference to caller, where it'll be a full-blown mntput().

Check under mount_lock is needed; leaving the current one done before
taking that makes no sense - it's nowhere near common enough to bother
with.

Comment 1 Avinash Hanwate 2025-06-20 20:56:59 UTC
Upstream advisory:
https://lore.kernel.org/linux-cve-announce/2025061834-CVE-2025-38058-fe06@gregkh/T


Note You need to log in before you can comment on or make changes to this bug.