-
CVE-2025-38337
- EPSS 0.04%
- Published 10.07.2025 08:15:08
- Last modified 10.07.2025 13:17:30
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: jbd2: fix data-race and null-ptr-deref in jbd2_journal_dirty_metadata() Since handle->h_transaction may be a NULL pointer, so we should change it to call is_handle_aborted(handle) first before dereferencing it. And the following data-race was reported in my fuzzer: ================================================================== BUG: KCSAN: data-race in jbd2_journal_dirty_metadata / jbd2_journal_dirty_metadata write to 0xffff888011024104 of 4 bytes by task 10881 on cpu 1: jbd2_journal_dirty_metadata+0x2a5/0x770 fs/jbd2/transaction.c:1556 __ext4_handle_dirty_metadata+0xe7/0x4b0 fs/ext4/ext4_jbd2.c:358 ext4_do_update_inode fs/ext4/inode.c:5220 [inline] ext4_mark_iloc_dirty+0x32c/0xd50 fs/ext4/inode.c:5869 __ext4_mark_inode_dirty+0xe1/0x450 fs/ext4/inode.c:6074 ext4_dirty_inode+0x98/0xc0 fs/ext4/inode.c:6103 .... read to 0xffff888011024104 of 4 bytes by task 10880 on cpu 0: jbd2_journal_dirty_metadata+0xf2/0x770 fs/jbd2/transaction.c:1512 __ext4_handle_dirty_metadata+0xe7/0x4b0 fs/ext4/ext4_jbd2.c:358 ext4_do_update_inode fs/ext4/inode.c:5220 [inline] ext4_mark_iloc_dirty+0x32c/0xd50 fs/ext4/inode.c:5869 __ext4_mark_inode_dirty+0xe1/0x450 fs/ext4/inode.c:6074 ext4_dirty_inode+0x98/0xc0 fs/ext4/inode.c:6103 .... value changed: 0x00000000 -> 0x00000001 ================================================================== This issue is caused by missing data-race annotation for jh->b_modified. Therefore, the missing annotation needs to be added.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
5c1a34ff5b0bfdfd2f9343aa9b08d25df618bac5
Version
6e06ae88edae77379bef7c0cb7d3c2dd88676867
Status
affected
Version <
ec669e5bf409f16e464bfad75f0ba039a45de29a
Version
6e06ae88edae77379bef7c0cb7d3c2dd88676867
Status
affected
Version <
43d5e3bb5f1dcd91e30238ea0b59a5f77063f84e
Version
6e06ae88edae77379bef7c0cb7d3c2dd88676867
Status
affected
Version <
23361b479f2700c00960d3ae9cdc8ededa762d47
Version
6e06ae88edae77379bef7c0cb7d3c2dd88676867
Status
affected
Version <
2e7c64d7a92c031d016f11c8e8cb05131ab7b75a
Version
6e06ae88edae77379bef7c0cb7d3c2dd88676867
Status
affected
Version <
f78b38af3540b4875147b7b884ee11a27b3dbf4c
Version
6e06ae88edae77379bef7c0cb7d3c2dd88676867
Status
affected
Version <
a377996d714afb8d4d5f4906336f78510039da29
Version
6e06ae88edae77379bef7c0cb7d3c2dd88676867
Status
affected
Version <
af98b0157adf6504fade79b3e6cb260c4ff68e37
Version
6e06ae88edae77379bef7c0cb7d3c2dd88676867
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
4.3
Status
affected
Version <
4.3
Version
0
Status
unaffected
Version <=
5.4.*
Version
5.4.295
Status
unaffected
Version <=
5.10.*
Version
5.10.239
Status
unaffected
Version <=
5.15.*
Version
5.15.186
Status
unaffected
Version <=
6.1.*
Version
6.1.142
Status
unaffected
Version <=
6.6.*
Version
6.6.95
Status
unaffected
Version <=
6.12.*
Version
6.12.35
Status
unaffected
Version <=
6.15.*
Version
6.15.4
Status
unaffected
Version <=
*
Version
6.16
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.098 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|