
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability in the Linux kernel's netfs module has been identified and assigned CVE-2025-21643. The issue affects the kernel's ability to handle kernel-initiated asynchronous DIO (Direct I/O) operations when supplied with a bio_vec[] array. The vulnerability was discovered on January 19, 2025, and affects the netfs filesystem implementation (NVD).
The vulnerability occurs because the async flag causes DIO operations to be passed to netfsextractuseriter() which only handles IOVEC and UBUF iterators. When triggered, the system generates a warning message at fs/netfs/iterator.c:50 and fails the write operation. This can be reproduced through a combination of CIFS and loopback blockdev operations. The issue stems from a check in netfsunbufferedwriteiter_locked() that incorrectly handles async kernel DIO writes as userspace writes (Kernel Commit).
When exploited, this vulnerability causes write operations to fail and generates warning messages in the system log. The impact is primarily on system functionality, specifically affecting file operations that involve asynchronous Direct I/O operations through the netfs filesystem layer (NVD).
The issue has been fixed by removing the check in netfsunbufferedwriteiterlocked() that causes async kernel DIO writes to be handled as userspace writes. The fix relies on the kernel caller maintaining the existence of the bio_vec array until the operation is complete. The patch has been committed to the Linux kernel repository (Kernel Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."