{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T16:36:37.026","vulnerabilities":[{"cve":{"id":"CVE-2025-38620","sourceIdentifier":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","published":"2025-08-22T16:15:35.320","lastModified":"2025-11-26T17:45:17.897","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nzloop: fix KASAN use-after-free of tag set\n\nWhen a zoned loop device, or zloop device, is removed, KASAN enabled\nkernel reports \"BUG KASAN use-after-free\" in blk_mq_free_tag_set(). The\nBUG happens because zloop_ctl_remove() calls put_disk(), which invokes\nzloop_free_disk(). The zloop_free_disk() frees the memory allocated for\nthe zlo pointer. However, after the memory is freed, zloop_ctl_remove()\ncalls blk_mq_free_tag_set(&zlo->tag_set), which accesses the freed zlo.\nHence the KASAN use-after-free.\n\n zloop_ctl_remove()\n  put_disk(zlo->disk)\n   put_device()\n    kobject_put()\n     ...\n      zloop_free_disk()\n        kvfree(zlo)\n  blk_mq_free_tag_set(&zlo->tag_set)\n\nTo avoid the BUG, move the call to blk_mq_free_tag_set(&zlo->tag_set)\nfrom zloop_ctl_remove() into zloop_free_disk(). This ensures that\nthe tag_set is freed before the call to kvfree(zlo)."},{"lang":"es","value":"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: zloop: corrección del uso tras liberación de KASAN del conjunto de etiquetas. Al eliminar un dispositivo de bucle zonificado o un dispositivo zloop, el kernel habilitado para KASAN informa \"BUG KASAN use after-free\" en blk_mq_free_tag_set(). El error se produce porque zloop_ctl_remove() llama a put_disk(), que a su vez invoca zloop_free_disk(). zloop_free_disk() libera la memoria asignada al puntero zloop. Sin embargo, una vez liberada la memoria, zloop_ctl_remove() llama a blk_mq_free_tag_set(&amp;zlo-&gt;tag_set), que accede al puntero zloop liberado. De ahí use-after-free de KASAN. Para evitar el error, mueva la llamada a blk_mq_free_tag_set(&amp;zlo-&gt;tag_set) de zloop_ctl_remove() a zloop_free_disk(). Esto garantiza que el conjunto de etiquetas se libere antes de la llamada a kvfree(zlo)."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-416"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:6.16:*:*:*:*:*:*:*","matchCriteriaId":"D6BFC4F7-7099-4420-AF39-DD1CEABB8DF9"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/765761851d89c772f482494d452e266795460278","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/c7c87046b41a9ef28ee7ac476c369da5b5228bc5","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]}]}}]}