-
CVE-2025-40233
- EPSS 0.06%
- Veröffentlicht 04.12.2025 15:31:23
- Zuletzt bearbeitet 15.04.2026 00:35:42
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
ocfs2: clear extent cache after moving/defragmenting extents
In the Linux kernel, the following vulnerability has been resolved: ocfs2: clear extent cache after moving/defragmenting extents The extent map cache can become stale when extents are moved or defragmented, causing subsequent operations to see outdated extent flags. This triggers a BUG_ON in ocfs2_refcount_cal_cow_clusters(). The problem occurs when: 1. copy_file_range() creates a reflinked extent with OCFS2_EXT_REFCOUNTED 2. ioctl(FITRIM) triggers ocfs2_move_extents() 3. __ocfs2_move_extents_range() reads and caches the extent (flags=0x2) 4. ocfs2_move_extent()/ocfs2_defrag_extent() calls __ocfs2_move_extent() which clears OCFS2_EXT_REFCOUNTED flag on disk (flags=0x0) 5. The extent map cache is not invalidated after the move 6. Later write() operations read stale cached flags (0x2) but disk has updated flags (0x0), causing a mismatch 7. BUG_ON(!(rec->e_flags & OCFS2_EXT_REFCOUNTED)) triggers Fix by clearing the extent map cache after each extent move/defrag operation in __ocfs2_move_extents_range(). This ensures subsequent operations read fresh extent data from disk.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version
53069d4e76954e2e63c1b3c501051c6fbcf7298c
Version <
93166bc53c0e3587058327a4121daea34b4fecd5
Status
affected
Version
53069d4e76954e2e63c1b3c501051c6fbcf7298c
Version <
a7ee72286efba1d407c6f15a0528e43593fb7007
Status
affected
Version
53069d4e76954e2e63c1b3c501051c6fbcf7298c
Version <
93b1ab422f1966b71561158e1aedce4ec100f357
Status
affected
Version
53069d4e76954e2e63c1b3c501051c6fbcf7298c
Version <
e92af7737a94a729225d2a5d180eaaa77fe0bbc1
Status
affected
Version
53069d4e76954e2e63c1b3c501051c6fbcf7298c
Version <
aa6a21409dd6221bb268b56bb410e031c632ff9a
Status
affected
Version
53069d4e76954e2e63c1b3c501051c6fbcf7298c
Version <
bb69928ed578f881e68d26aaf1a8f6e7faab3b44
Status
affected
Version
53069d4e76954e2e63c1b3c501051c6fbcf7298c
Version <
a21750df2f6169af6e039a3bb4893d6c9564e48d
Status
affected
Version
53069d4e76954e2e63c1b3c501051c6fbcf7298c
Version <
78a63493f8e352296dbc7cb7b3f4973105e8679e
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
3.0
Status
affected
Version
0
Version <
3.0
Status
unaffected
Version <=
5.4.*
Version
5.4.301
Status
unaffected
Version <=
5.10.*
Version
5.10.246
Status
unaffected
Version <=
5.15.*
Version
5.15.196
Status
unaffected
Version <=
6.1.*
Version
6.1.158
Status
unaffected
Version <=
6.6.*
Version
6.6.115
Status
unaffected
Version <=
6.12.*
Version
6.12.56
Status
unaffected
Version <=
6.17.*
Version
6.17.6
Status
unaffected
Version <=
*
Version
6.18
Status
unaffected
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.06% | 0.181 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|