CVE-2025-37999

Source
https://cve.org/CVERecord?id=CVE-2025-37999
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-37999.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-37999
Downstream
Published
2025-05-29T13:15:56.825Z
Modified
2026-03-20T12:42:36.782342Z
Summary
fs/erofs/fileio: call erofs_onlinefolio_split() after bio_add_folio()
Details

In the Linux kernel, the following vulnerability has been resolved:

fs/erofs/fileio: call erofsonlinefoliosplit() after bioaddfolio()

If bioaddfolio() fails (because it is full), erofsfileioscanfolio() needs to submit the I/O request via erofsfileiorqsubmit() and allocate a new I/O request with an empty struct bio. Then it retries the bioaddfolio() call.

However, at this point, erofsonlinefoliosplit() has already been called which increments folio->private; the retry will call erofsonlinefoliosplit() again, but there will never be a matching erofsonlinefolioend() call. This leaves the folio locked forever and all waiters will be stuck in foliowaitbit_common().

This bug has been added by commit ce63cb62d794 ("erofs: support unencoded inodes for fileio"), but was practically unreachable because there was room for 256 folios in the struct bio - until commit 9f74ae8c9ac9 ("erofs: shorten bvecs[] for file-backed mounts") which reduced the array capacity to 16 folios.

It was now trivial to trigger the bug by manually invoking readahead from userspace, e.g.:

posixfadvise(fd, 0, st.stsize, POSIXFADVWILLNEED);

This should be fixed by invoking erofsonlinefoliosplit() only after bioaddfolio() has succeeded. This is safe: asynchronous completions invoking erofsonlinefolioend() will not unlock the folio because erofsfileioscanfolio() is still holding a reference to be released by erofsonlinefolio_end() at the end.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/37xxx/CVE-2025-37999.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
ce63cb62d794c98c7631c2296fa845f2a8d0a4a1
Fixed
61e0fc3312309867e5a3495329dad0286d2a5703
Fixed
c26076197df348c84cc23e5962d61902e072a0f5
Fixed
bbfe756dc3062c1e934f06e5ba39c239aa953b92

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-37999.json"