CVE-2025-38194
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
04/07/2025
Last modified:
18/12/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
jffs2: check that raw node were preallocated before writing summary<br />
<br />
Syzkaller detected a kernel bug in jffs2_link_node_ref, caused by fault<br />
injection in jffs2_prealloc_raw_node_refs. jffs2_sum_write_sumnode doesn&#39;t<br />
check return value of jffs2_prealloc_raw_node_refs and simply lets any<br />
error propagate into jffs2_sum_write_data, which eventually calls<br />
jffs2_link_node_ref in order to link the summary to an expectedly allocated<br />
node.<br />
<br />
kernel BUG at fs/jffs2/nodelist.c:592!<br />
invalid opcode: 0000 [#1] PREEMPT SMP KASAN NOPTI<br />
CPU: 1 PID: 31277 Comm: syz-executor.7 Not tainted 6.1.128-syzkaller-00139-ge10f83ca10a1 #0<br />
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014<br />
RIP: 0010:jffs2_link_node_ref+0x570/0x690 fs/jffs2/nodelist.c:592<br />
Call Trace:<br />
<br />
jffs2_sum_write_data fs/jffs2/summary.c:841 [inline]<br />
jffs2_sum_write_sumnode+0xd1a/0x1da0 fs/jffs2/summary.c:874<br />
jffs2_do_reserve_space+0xa18/0xd60 fs/jffs2/nodemgmt.c:388<br />
jffs2_reserve_space+0x55f/0xaa0 fs/jffs2/nodemgmt.c:197<br />
jffs2_write_inode_range+0x246/0xb50 fs/jffs2/write.c:362<br />
jffs2_write_end+0x726/0x15d0 fs/jffs2/file.c:301<br />
generic_perform_write+0x314/0x5d0 mm/filemap.c:3856<br />
__generic_file_write_iter+0x2ae/0x4d0 mm/filemap.c:3973<br />
generic_file_write_iter+0xe3/0x350 mm/filemap.c:4005<br />
call_write_iter include/linux/fs.h:2265 [inline]<br />
do_iter_readv_writev+0x20f/0x3c0 fs/read_write.c:735<br />
do_iter_write+0x186/0x710 fs/read_write.c:861<br />
vfs_iter_write+0x70/0xa0 fs/read_write.c:902<br />
iter_file_splice_write+0x73b/0xc90 fs/splice.c:685<br />
do_splice_from fs/splice.c:763 [inline]<br />
direct_splice_actor+0x10c/0x170 fs/splice.c:950<br />
splice_direct_to_actor+0x337/0xa10 fs/splice.c:896<br />
do_splice_direct+0x1a9/0x280 fs/splice.c:1002<br />
do_sendfile+0xb13/0x12c0 fs/read_write.c:1255<br />
__do_sys_sendfile64 fs/read_write.c:1323 [inline]<br />
__se_sys_sendfile64 fs/read_write.c:1309 [inline]<br />
__x64_sys_sendfile64+0x1cf/0x210 fs/read_write.c:1309<br />
do_syscall_x64 arch/x86/entry/common.c:51 [inline]<br />
do_syscall_64+0x35/0x80 arch/x86/entry/common.c:81<br />
entry_SYSCALL_64_after_hwframe+0x6e/0xd8<br />
<br />
Fix this issue by checking return value of jffs2_prealloc_raw_node_refs<br />
before calling jffs2_sum_write_data.<br />
<br />
Found by Linux Verification Center (linuxtesting.org) with Syzkaller.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.18 (including) | 5.4.295 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.239 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.186 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.142 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.95 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.35 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.15.4 (excluding) |
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/337f80f3d546e131c7aa90b61d8cde051ae858c7
- https://git.kernel.org/stable/c/346cfb9d19ea7feb6fb57917b21c4797fb444dab
- https://git.kernel.org/stable/c/3f46644a5131a4793fc95c32a7d0a769745b06e7
- https://git.kernel.org/stable/c/4adee34098a6ee86a54bf3ec885eab620c126a6b
- https://git.kernel.org/stable/c/8ce46dc5b10b0b6f67663202a4921b0e11ad7367
- https://git.kernel.org/stable/c/c0edcdb4fc106d69a2d1a0ce4868193511c389f3
- https://git.kernel.org/stable/c/da12ef7e19048dc5714032c2db587a215852b200
- https://git.kernel.org/stable/c/ec9e6f22bce433b260ea226de127ec68042849b0
- https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html



