We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-38194

jffs2: check that raw node were preallocated before writing summary



Description

In the Linux kernel, the following vulnerability has been resolved: jffs2: check that raw node were preallocated before writing summary Syzkaller detected a kernel bug in jffs2_link_node_ref, caused by fault injection in jffs2_prealloc_raw_node_refs. jffs2_sum_write_sumnode doesn't check return value of jffs2_prealloc_raw_node_refs and simply lets any error propagate into jffs2_sum_write_data, which eventually calls jffs2_link_node_ref in order to link the summary to an expectedly allocated node. kernel BUG at fs/jffs2/nodelist.c:592! invalid opcode: 0000 [#1] PREEMPT SMP KASAN NOPTI CPU: 1 PID: 31277 Comm: syz-executor.7 Not tainted 6.1.128-syzkaller-00139-ge10f83ca10a1 #0 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 RIP: 0010:jffs2_link_node_ref+0x570/0x690 fs/jffs2/nodelist.c:592 Call Trace: <TASK> jffs2_sum_write_data fs/jffs2/summary.c:841 [inline] jffs2_sum_write_sumnode+0xd1a/0x1da0 fs/jffs2/summary.c:874 jffs2_do_reserve_space+0xa18/0xd60 fs/jffs2/nodemgmt.c:388 jffs2_reserve_space+0x55f/0xaa0 fs/jffs2/nodemgmt.c:197 jffs2_write_inode_range+0x246/0xb50 fs/jffs2/write.c:362 jffs2_write_end+0x726/0x15d0 fs/jffs2/file.c:301 generic_perform_write+0x314/0x5d0 mm/filemap.c:3856 __generic_file_write_iter+0x2ae/0x4d0 mm/filemap.c:3973 generic_file_write_iter+0xe3/0x350 mm/filemap.c:4005 call_write_iter include/linux/fs.h:2265 [inline] do_iter_readv_writev+0x20f/0x3c0 fs/read_write.c:735 do_iter_write+0x186/0x710 fs/read_write.c:861 vfs_iter_write+0x70/0xa0 fs/read_write.c:902 iter_file_splice_write+0x73b/0xc90 fs/splice.c:685 do_splice_from fs/splice.c:763 [inline] direct_splice_actor+0x10c/0x170 fs/splice.c:950 splice_direct_to_actor+0x337/0xa10 fs/splice.c:896 do_splice_direct+0x1a9/0x280 fs/splice.c:1002 do_sendfile+0xb13/0x12c0 fs/read_write.c:1255 __do_sys_sendfile64 fs/read_write.c:1323 [inline] __se_sys_sendfile64 fs/read_write.c:1309 [inline] __x64_sys_sendfile64+0x1cf/0x210 fs/read_write.c:1309 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x35/0x80 arch/x86/entry/common.c:81 entry_SYSCALL_64_after_hwframe+0x6e/0xd8 Fix this issue by checking return value of jffs2_prealloc_raw_node_refs before calling jffs2_sum_write_data. Found by Linux Verification Center (linuxtesting.org) with Syzkaller.

Reserved 2025-04-16 | Published 2025-07-04 | Updated 2025-07-04 | Assigner Linux

Product status

Default status
unaffected

2f785402f39b96a077b6e62bf26164bfb8e0c980 before 337f80f3d546e131c7aa90b61d8cde051ae858c7
affected

2f785402f39b96a077b6e62bf26164bfb8e0c980 before 8ce46dc5b10b0b6f67663202a4921b0e11ad7367
affected

2f785402f39b96a077b6e62bf26164bfb8e0c980 before 4adee34098a6ee86a54bf3ec885eab620c126a6b
affected

2f785402f39b96a077b6e62bf26164bfb8e0c980 before c0edcdb4fc106d69a2d1a0ce4868193511c389f3
affected

2f785402f39b96a077b6e62bf26164bfb8e0c980 before 3f46644a5131a4793fc95c32a7d0a769745b06e7
affected

2f785402f39b96a077b6e62bf26164bfb8e0c980 before da12ef7e19048dc5714032c2db587a215852b200
affected

2f785402f39b96a077b6e62bf26164bfb8e0c980 before 346cfb9d19ea7feb6fb57917b21c4797fb444dab
affected

2f785402f39b96a077b6e62bf26164bfb8e0c980 before ec9e6f22bce433b260ea226de127ec68042849b0
affected

Default status
affected

2.6.18
affected

Any version before 2.6.18
unaffected

5.4.295
unaffected

5.10.239
unaffected

5.15.186
unaffected

6.1.142
unaffected

6.6.95
unaffected

6.12.35
unaffected

6.15.4
unaffected

6.16-rc1
unaffected

References

git.kernel.org/...c/337f80f3d546e131c7aa90b61d8cde051ae858c7

git.kernel.org/...c/8ce46dc5b10b0b6f67663202a4921b0e11ad7367

git.kernel.org/...c/4adee34098a6ee86a54bf3ec885eab620c126a6b

git.kernel.org/...c/c0edcdb4fc106d69a2d1a0ce4868193511c389f3

git.kernel.org/...c/3f46644a5131a4793fc95c32a7d0a769745b06e7

git.kernel.org/...c/da12ef7e19048dc5714032c2db587a215852b200

git.kernel.org/...c/346cfb9d19ea7feb6fb57917b21c4797fb444dab

git.kernel.org/...c/ec9e6f22bce433b260ea226de127ec68042849b0

cve.org (CVE-2025-38194)

nvd.nist.gov (CVE-2025-38194)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-38194

Support options

Helpdesk Chat, Email, Knowledgebase