-

CVE-2025-39734

In the Linux kernel, the following vulnerability has been resolved:

Revert "fs/ntfs3: Replace inode_trylock with inode_lock"

This reverts commit 69505fe98f198ee813898cbcaf6770949636430b.

Initially, conditional lock acquisition was removed to fix an xfstest bug
that was observed during internal testing. The deadlock reported by syzbot
is resolved by reintroducing conditional acquisition. The xfstest bug no
longer occurs on kernel version 6.16-rc1 during internal testing. I
assume that changes in other modules may have contributed to this.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < bec8109f957a6e193e52d1728799994c8005ca83
Version e3e3b3eb54feaf6400800812c8d0f95a7213923d
Status affected
Version < 1903a6c1f2818154f6bc87bceaaecafa92b6ac5c
Version 7a498fc945080bccc25fdc36f1d663798441158b
Status affected
Version < a936be9b5f51c4d23f66fb673e9068c6b08104a4
Version 53173e3865acb06f3e86c703696510c12fecc612
Status affected
Version < b356ee013a79e7e3147bfe065de376706c5d2ee9
Version 69505fe98f198ee813898cbcaf6770949636430b
Status affected
Version < 7ce6f83ca9d52c9245b7a017466fc4baa1241b0b
Version 69505fe98f198ee813898cbcaf6770949636430b
Status affected
Version < bd20733746263acaaf2a21881665db27ee4303d5
Version 69505fe98f198ee813898cbcaf6770949636430b
Status affected
Version < a49f0abd8959048af18c6c690b065eb0d65b2d21
Version 69505fe98f198ee813898cbcaf6770949636430b
Status affected
Version d5ad80aabd5a76a5de52b7663b1f3223dd01ea38
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 6.11
Status affected
Version < 6.11
Version 0
Status unaffected
Version <= 5.15.*
Version 5.15.190
Status unaffected
Version <= 6.1.*
Version 6.1.148
Status unaffected
Version <= 6.6.*
Version 6.6.102
Status unaffected
Version <= 6.12.*
Version 6.12.42
Status unaffected
Version <= 6.15.*
Version 6.15.10
Status unaffected
Version <= 6.16.*
Version 6.16.1
Status unaffected
Version <= *
Version 6.17-rc1
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.04% 0.093
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String