In the Linux kernel, the following vulnerability has been resolved:
ext4: goto right label 'outmmapsem' in ext4_setattr()
Otherwise, if ext4inodeattachjinode() fails, a hung task will happen because filemapinvalidateunlock() isn't called to unlock mapping->invalidatelock. Like this:
EXT4-fs error (device sda) in ext4setattr:5557: Out of memory INFO: task fsstress:374 blocked for more than 122 seconds. Not tainted 6.14.0-rc1-next-20250206-xfstests-dirty #726 "echo 0 > /proc/sys/kernel/hungtasktimeoutsecs" disables this message. task:fsstress state:D stack:0 pid:374 tgid:374 ppid:373 taskflags:0x440140 flags:0x00000000 Call Trace: <TASK> _schedule+0x2c9/0x7f0 schedule+0x27/0xa0 schedulepreemptdisabled+0x15/0x30 rwsemdownreadslowpath+0x278/0x4c0 downread+0x59/0xb0 pagecacheraunbounded+0x65/0x1b0 filemapgetpages+0x124/0x3e0 filemapread+0x114/0x3d0 vfsread+0x297/0x360 ksysread+0x6c/0xe0 dosyscall64+0x4b/0x110 entrySYSCALL64afterhwframe+0x76/0x7e
[
{
"digest": {
"length": 3879.0,
"function_hash": "1560397399597062189389448381865753213"
},
"target": {
"function": "ext4_setattr",
"file": "fs/ext4/inode.c"
},
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7e91ae31e2d264155dfd102101afc2de7bd74a64",
"id": "CVE-2025-22120-2e6f593a",
"signature_type": "Function"
},
{
"digest": {
"line_hashes": [
"260923217370599031298709156396334173061",
"253387266541047255165030272401058711494",
"118671447346803833338530956685183604304",
"166809949393171511753902993770966395633"
],
"threshold": 0.9
},
"target": {
"file": "fs/ext4/inode.c"
},
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@32d872e3905746ff1048078256cb00f946b97d8a",
"id": "CVE-2025-22120-57f1c661",
"signature_type": "Line"
},
{
"digest": {
"line_hashes": [
"260923217370599031298709156396334173061",
"253387266541047255165030272401058711494",
"118671447346803833338530956685183604304",
"166809949393171511753902993770966395633"
],
"threshold": 0.9
},
"target": {
"file": "fs/ext4/inode.c"
},
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@551667f99bcf04fa58594d7d19aef73c861a1200",
"id": "CVE-2025-22120-9827a82b",
"signature_type": "Line"
},
{
"digest": {
"length": 3869.0,
"function_hash": "35597950457704055665873022023160373882"
},
"target": {
"function": "ext4_setattr",
"file": "fs/ext4/inode.c"
},
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@32d872e3905746ff1048078256cb00f946b97d8a",
"id": "CVE-2025-22120-b13e3048",
"signature_type": "Function"
},
{
"digest": {
"length": 3869.0,
"function_hash": "35597950457704055665873022023160373882"
},
"target": {
"function": "ext4_setattr",
"file": "fs/ext4/inode.c"
},
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@551667f99bcf04fa58594d7d19aef73c861a1200",
"id": "CVE-2025-22120-e48ad4bb",
"signature_type": "Function"
},
{
"digest": {
"line_hashes": [
"260923217370599031298709156396334173061",
"253387266541047255165030272401058711494",
"118671447346803833338530956685183604304",
"166809949393171511753902993770966395633"
],
"threshold": 0.9
},
"target": {
"file": "fs/ext4/inode.c"
},
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7e91ae31e2d264155dfd102101afc2de7bd74a64",
"id": "CVE-2025-22120-f53d0975",
"signature_type": "Line"
}
]