{"id":"CVE-2025-40361","summary":"fs: ext4: change GFP_KERNEL to GFP_NOFS to avoid deadlock","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nfs: ext4: change GFP_KERNEL to GFP_NOFS to avoid deadlock\n\nThe parent function ext4_xattr_inode_lookup_create already uses GFP_NOFS for memory alloction, so the function ext4_xattr_inode_cache_find should use same gfp_flag.","modified":"2026-03-12T03:54:40.422433Z","published":"2025-12-16T13:40:00.758Z","related":["MGASA-2026-0017","MGASA-2026-0018"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/40xxx/CVE-2025-40361.json"},"references":[{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"},{"type":"WEB","url":"https://git.kernel.org/stable/c/009127b0fc013aed193961686c28c2b541a5b2f3"},{"type":"WEB","url":"https://git.kernel.org/stable/c/1534f72dc2a11ded38b0e0268fbcc0ca24e9fd4a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/199ab7b43c5ef7d384f6a08e786e107b3509acda"},{"type":"WEB","url":"https://git.kernel.org/stable/c/238f7a7356c33a9797a6297c6fdfd87f113b2325"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5e6b27f4e68682aa3db9f83ca04adef89903159b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/add8458cac0b33a5e7a6b98457b38baea9600859"},{"type":"WEB","url":"https://git.kernel.org/stable/c/bb7d0d13c6e1f061464d1c425b08348a4e0c235d"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/40xxx/CVE-2025-40361.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-40361"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"71b565ceff377a52e7d58cd871745cd339447323"},{"fixed":"5e6b27f4e68682aa3db9f83ca04adef89903159b"},{"fixed":"bb7d0d13c6e1f061464d1c425b08348a4e0c235d"},{"fixed":"add8458cac0b33a5e7a6b98457b38baea9600859"},{"fixed":"199ab7b43c5ef7d384f6a08e786e107b3509acda"},{"fixed":"238f7a7356c33a9797a6297c6fdfd87f113b2325"},{"fixed":"009127b0fc013aed193961686c28c2b541a5b2f3"},{"fixed":"1534f72dc2a11ded38b0e0268fbcc0ca24e9fd4a"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-40361.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"5.6.0"},{"fixed":"5.10.247"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.197"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.159"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.117"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.12.58"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.13.0"},{"fixed":"6.17.8"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-40361.json"}}],"schema_version":"1.7.5"}