Home

Description

In the Linux kernel, the following vulnerability has been resolved: ocfs2: prevent release journal inode after journal shutdown Before calling ocfs2_delete_osb(), ocfs2_journal_shutdown() has already been executed in ocfs2_dismount_volume(), so osb->journal must be NULL. Therefore, the following calltrace will inevitably fail when it reaches jbd2_journal_release_jbd_inode(). ocfs2_dismount_volume()-> ocfs2_delete_osb()-> ocfs2_free_slot_info()-> __ocfs2_free_slot_info()-> evict()-> ocfs2_evict_inode()-> ocfs2_clear_inode()-> jbd2_journal_release_jbd_inode(osb->journal->j_journal, Adding osb->journal checks will prevent null-ptr-deref during the above execution path.

PUBLISHED Reserved 2025-04-16 | Published 2025-09-19 | Updated 2025-09-19 | Assigner Linux

Product status

Default status
unaffected

da5e7c87827e8caa6a1eeec6d95dcf74ab592a01 before 42c415c53ad2065088cc411d08925effa5b3d255
affected

da5e7c87827e8caa6a1eeec6d95dcf74ab592a01 before e9188f66e94955431ddbe2cd1cdf8ff2bb486abf
affected

da5e7c87827e8caa6a1eeec6d95dcf74ab592a01 before f4a917e6cd6c798f7adf39907f117fc754db1283
affected

da5e7c87827e8caa6a1eeec6d95dcf74ab592a01 before 85e66331b60601d903cceaf8c10a234db863cd78
affected

da5e7c87827e8caa6a1eeec6d95dcf74ab592a01 before f46e8ef8bb7b452584f2e75337b619ac51a7cadf
affected

Default status
affected

5.16
affected

Any version before 5.16
unaffected

6.1.151
unaffected

6.6.105
unaffected

6.12.46
unaffected

6.16.6
unaffected

6.17-rc5
unaffected

References

git.kernel.org/...c/42c415c53ad2065088cc411d08925effa5b3d255

git.kernel.org/...c/e9188f66e94955431ddbe2cd1cdf8ff2bb486abf

git.kernel.org/...c/f4a917e6cd6c798f7adf39907f117fc754db1283

git.kernel.org/...c/85e66331b60601d903cceaf8c10a234db863cd78

git.kernel.org/...c/f46e8ef8bb7b452584f2e75337b619ac51a7cadf

cve.org (CVE-2025-39842)

nvd.nist.gov (CVE-2025-39842)

Download JSON