CVE-2025-38697
Description
In the Linux kernel, the following vulnerability has been resolved:
jfs: upper bound check of tree index in dbAllocAG
When computing the tree index in dbAllocAG, we never check if we are out of bounds realative to the size of the stree. This could happen in a scenario where the filesystem metadata are corrupted.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In the Linux kernel's JFS filesystem, dbAllocAG lacks an upper bound check on the tree index, leading to potential out-of-bounds access when metadata is corrupted.
Vulnerability
Overview
In the Linux kernel, the JFS filesystem's dbAllocAG function computes a tree index without verifying it against the size of the stree array. This missing upper bound check can cause an out-of-bounds read or write when the filesystem metadata is corrupted. The issue is present in the JFS allocation logic and can be triggered by specially crafted or corrupted on-disk structures [1].
Exploitation
Prerequisites
Exploitation requires an attacker to have the ability to corrupt JFS filesystem metadata, either through physical access, a compromised storage device, or by mounting a maliciously crafted filesystem image. No additional privileges beyond those needed to mount the filesystem are required, but the attacker must control or influence the on-disk data that dbAllocAG processes [1].
Impact
An out-of-bounds access resulting from this flaw could lead to system instability, denial of service, or potentially arbitrary code execution, depending on how the corrupted index is used by the kernel. The Linux kernel's memory safety mechanisms may mitigate some exploitation paths, but the severity is rated as High with a CVSS v3 of 7.8 [1].
Mitigation
Patches for this vulnerability have been committed to the Linux kernel stable tree. Users should update to a kernel version containing the fix, which introduces the missing upper bound check in dbAllocAG. The issue affects JFS filesystems and any system using the JFS driver with untrusted filesystem images [2][3][4].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- Linux/Linuxv5Range: 2.6.12
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
12- git.kernel.org/stable/c/1467a75819e41341cd5ebd16faa2af1ca3c8f4fenvdPatch
- git.kernel.org/stable/c/173cfd741ad7073640bfb7e2344c2a0ee005e769nvdPatch
- git.kernel.org/stable/c/2dd05f09cc323018136a7ecdb3d1007be9ede27fnvdPatch
- git.kernel.org/stable/c/30e19a884c0b11f33821aacda7e72e914bec26efnvdPatch
- git.kernel.org/stable/c/49ea46d9025aa1914b24ea957636cbe4367a7311nvdPatch
- git.kernel.org/stable/c/5bdb9553fb134fd52ec208a8b378120670f6e784nvdPatch
- git.kernel.org/stable/c/a4f199203f79ca9cd7355799ccb26800174ff093nvdPatch
- git.kernel.org/stable/c/c214006856ff52a8ff17ed8da52d50601d54f9cenvdPatch
- git.kernel.org/stable/c/c8ca21a2836993d7cb816668458e05e598574e55nvdPatch
- lists.debian.org/debian-lts-announce/2025/10/msg00007.htmlnvdMailing ListThird Party Advisory
- lists.debian.org/debian-lts-announce/2025/10/msg00008.htmlnvdMailing ListThird Party Advisory
- cert-portal.siemens.com/productcert/html/ssa-032379.htmlnvd
News mentions
1- Siemens SIMATICCISA ICS Advisories