In the Linux kernel, the following vulnerability has been resolved:
nvmet: fix memory leak of bio integrity
If nvmet receives commands with metadata there is a continuous memory leak of kmalloc-128 slab or more precisely bio->bi_integrity.
Since commit bf4c89fc8797 ("block: don't call biouninit from bioendio") each user of bioinit has to use biouninit as well. Otherwise the bio integrity is not getting free. Nvmet uses bio_init for inline bios.
Uninit the inline bio to complete deallocation of integrity in bio.
[
{
"digest": {
"line_hashes": [
"11338244337939768184381642437087197668",
"66968097651109914370972389497750915980",
"185467916311922373144041478081733646190",
"186778691287913198593236221929767698720"
],
"threshold": 0.9
},
"target": {
"file": "drivers/nvme/target/nvmet.h"
},
"signature_type": "Line",
"id": "CVE-2025-38405-580ee934",
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@431e58d56fcb5ff1f9eb630724a922e0d2a941df"
},
{
"digest": {
"length": 129.0,
"function_hash": "264716416469062576975325971144577285889"
},
"target": {
"file": "drivers/nvme/target/nvmet.h",
"function": "nvmet_req_bio_put"
},
"signature_type": "Function",
"id": "CVE-2025-38405-5a7c7d71",
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@431e58d56fcb5ff1f9eb630724a922e0d2a941df"
},
{
"digest": {
"length": 129.0,
"function_hash": "264716416469062576975325971144577285889"
},
"target": {
"file": "drivers/nvme/target/nvmet.h",
"function": "nvmet_req_bio_put"
},
"signature_type": "Function",
"id": "CVE-2025-38405-68b8de34",
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2e2028fcf924d1c6df017033c8d6e28b735a0508"
},
{
"digest": {
"length": 129.0,
"function_hash": "264716416469062576975325971144577285889"
},
"target": {
"file": "drivers/nvme/target/nvmet.h",
"function": "nvmet_req_bio_put"
},
"signature_type": "Function",
"id": "CVE-2025-38405-6d27fe0c",
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@190f4c2c863af7cc5bb354b70e0805f06419c038"
},
{
"digest": {
"line_hashes": [
"11338244337939768184381642437087197668",
"66968097651109914370972389497750915980",
"200108854490943607557878708923517068143",
"263130796333327796408573261014272586865"
],
"threshold": 0.9
},
"target": {
"file": "drivers/nvme/target/nvmet.h"
},
"signature_type": "Line",
"id": "CVE-2025-38405-edc64cbe",
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@190f4c2c863af7cc5bb354b70e0805f06419c038"
},
{
"digest": {
"line_hashes": [
"11338244337939768184381642437087197668",
"66968097651109914370972389497750915980",
"200108854490943607557878708923517068143",
"263130796333327796408573261014272586865"
],
"threshold": 0.9
},
"target": {
"file": "drivers/nvme/target/nvmet.h"
},
"signature_type": "Line",
"id": "CVE-2025-38405-f5aebbe4",
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2e2028fcf924d1c6df017033c8d6e28b735a0508"
}
]