-
CVE-2025-38659
- EPSS 0.03%
- Veröffentlicht 22.08.2025 16:01:02
- Zuletzt bearbeitet 22.08.2025 18:08:51
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: gfs2: No more self recovery When a node withdraws and it turns out that it is the only node that has the filesystem mounted, gfs2 currently tries to replay the local journal to bring the filesystem back into a consistent state. Not only is that a very bad idea, it has also never worked because gfs2_recover_func() will refuse to do anything during a withdraw. However, before even getting to this point, gfs2_recover_func() dereferences sdp->sd_jdesc->jd_inode. This was a use-after-free before commit 04133b607a78 ("gfs2: Prevent double iput for journal on error") and is a NULL pointer dereference since then. Simply get rid of self recovery to fix that.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
1a91ba12abef628b43cada87478328274d988e88
Version
601ef0d52e9617588fcff3df26953592f2eb44ac
Status
affected
Version <
f5426ffbec971a8f7346a57392d3a901bdee5a9b
Version
601ef0d52e9617588fcff3df26953592f2eb44ac
Status
affected
Version <
6784367b2f3cd7b89103de35764f37f152590dbd
Version
601ef0d52e9617588fcff3df26953592f2eb44ac
Status
affected
Version <
97c94c7dbddc34d353c83b541b3decabf98d04af
Version
601ef0d52e9617588fcff3df26953592f2eb44ac
Status
affected
Version <
deb016c1669002e48c431d6fd32ea1c20ef41756
Version
601ef0d52e9617588fcff3df26953592f2eb44ac
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
5.7
Status
affected
Version <
5.7
Version
0
Status
unaffected
Version <=
6.6.*
Version
6.6.102
Status
unaffected
Version <=
6.12.*
Version
6.12.42
Status
unaffected
Version <=
6.15.*
Version
6.15.10
Status
unaffected
Version <=
6.16.*
Version
6.16.1
Status
unaffected
Version <=
*
Version
6.17-rc1
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.03% | 0.055 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|