CVE-2025-38337
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
10/07/2025
Last modified:
16/12/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
jbd2: fix data-race and null-ptr-deref in jbd2_journal_dirty_metadata()<br />
<br />
Since handle->h_transaction may be a NULL pointer, so we should change it<br />
to call is_handle_aborted(handle) first before dereferencing it.<br />
<br />
And the following data-race was reported in my fuzzer:<br />
<br />
==================================================================<br />
BUG: KCSAN: data-race in jbd2_journal_dirty_metadata / jbd2_journal_dirty_metadata<br />
<br />
write to 0xffff888011024104 of 4 bytes by task 10881 on cpu 1:<br />
jbd2_journal_dirty_metadata+0x2a5/0x770 fs/jbd2/transaction.c:1556<br />
__ext4_handle_dirty_metadata+0xe7/0x4b0 fs/ext4/ext4_jbd2.c:358<br />
ext4_do_update_inode fs/ext4/inode.c:5220 [inline]<br />
ext4_mark_iloc_dirty+0x32c/0xd50 fs/ext4/inode.c:5869<br />
__ext4_mark_inode_dirty+0xe1/0x450 fs/ext4/inode.c:6074<br />
ext4_dirty_inode+0x98/0xc0 fs/ext4/inode.c:6103<br />
....<br />
<br />
read to 0xffff888011024104 of 4 bytes by task 10880 on cpu 0:<br />
jbd2_journal_dirty_metadata+0xf2/0x770 fs/jbd2/transaction.c:1512<br />
__ext4_handle_dirty_metadata+0xe7/0x4b0 fs/ext4/ext4_jbd2.c:358<br />
ext4_do_update_inode fs/ext4/inode.c:5220 [inline]<br />
ext4_mark_iloc_dirty+0x32c/0xd50 fs/ext4/inode.c:5869<br />
__ext4_mark_inode_dirty+0xe1/0x450 fs/ext4/inode.c:6074<br />
ext4_dirty_inode+0x98/0xc0 fs/ext4/inode.c:6103<br />
....<br />
<br />
value changed: 0x00000000 -> 0x00000001<br />
==================================================================<br />
<br />
This issue is caused by missing data-race annotation for jh->b_modified.<br />
Therefore, the missing annotation needs to be added.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.3 (including) | 5.4.295 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.239 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.186 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.142 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.95 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.35 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.15.4 (excluding) |
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/23361b479f2700c00960d3ae9cdc8ededa762d47
- https://git.kernel.org/stable/c/2e7c64d7a92c031d016f11c8e8cb05131ab7b75a
- https://git.kernel.org/stable/c/43d5e3bb5f1dcd91e30238ea0b59a5f77063f84e
- https://git.kernel.org/stable/c/5c1a34ff5b0bfdfd2f9343aa9b08d25df618bac5
- https://git.kernel.org/stable/c/a377996d714afb8d4d5f4906336f78510039da29
- https://git.kernel.org/stable/c/af98b0157adf6504fade79b3e6cb260c4ff68e37
- https://git.kernel.org/stable/c/ec669e5bf409f16e464bfad75f0ba039a45de29a
- https://git.kernel.org/stable/c/f78b38af3540b4875147b7b884ee11a27b3dbf4c
- https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html



