CVE-2025-39842
Description
In the Linux kernel, the following vulnerability has been resolved:
ocfs2: prevent release journal inode after journal shutdown
Before calling ocfs2_delete_osb(), ocfs2_journal_shutdown() has already been executed in ocfs2_dismount_volume(), so osb->journal must be NULL. Therefore, the following calltrace will inevitably fail when it reaches jbd2_journal_release_jbd_inode().
ocfs2_dismount_volume()-> ocfs2_delete_osb()-> ocfs2_free_slot_info()-> __ocfs2_free_slot_info()-> evict()-> ocfs2_evict_inode()-> ocfs2_clear_inode()-> jbd2_journal_release_jbd_inode(osb->journal->j_journal,
Adding osb->journal checks will prevent null-ptr-deref during the above execution path.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In the Linux kernel's ocfs2 filesystem, a null-pointer dereference occurs when the journal is already shut down but the release path still accesses it, fixed by adding a NULL check.
Vulnerability
Overview
CVE-2025-39842 is a null-pointer dereference vulnerability in the Linux kernel's Oracle Cluster File System 2 (ocfs2). The root cause is a missing check for osb->journal being NULL after ocfs2_journal_shutdown() has been called during the unmount sequence. When ocfs2_dismount_volume() calls ocfs2_journal_shutdown(), the journal pointer is set to NULL. Subsequently, ocfs2_delete_osb() triggers a call chain that eventually reaches jbd2_journal_release_jbd_inode(), which dereferences the now-NULL journal pointer, causing a crash [1][2].
Exploitation
Conditions
An attacker would need to be able to trigger the unmount of an ocfs2 filesystem, which typically requires local access and the ability to unmount a volume. The vulnerability is triggered during normal system shutdown or filesystem unmount operations, not through remote exploitation. No authentication is required beyond the ability to execute the unmount command [1].
Impact
If exploited, this vulnerability leads to a kernel panic (denial of service) due to the null-pointer dereference. The system becomes unavailable until reboot. There is no evidence of privilege escalation or data corruption from this bug [1].
Mitigation
The fix adds a simple NULL check for osb->journal before calling jbd2_journal_release_jbd_inode(), preventing the dereference. The patch has been applied to the Linux kernel stable branches [2][3][4]. Users should update to a kernel version containing the fix. Siemens has also listed this CVE as affecting SIMATIC CN 4100 devices running versions before V5.0, and recommends updating to V5.0 or later [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Linux/Linuxv5Range: 5.16
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- git.kernel.org/stable/c/42c415c53ad2065088cc411d08925effa5b3d255nvdPatch
- git.kernel.org/stable/c/85e66331b60601d903cceaf8c10a234db863cd78nvdPatch
- git.kernel.org/stable/c/e9188f66e94955431ddbe2cd1cdf8ff2bb486abfnvdPatch
- git.kernel.org/stable/c/f46e8ef8bb7b452584f2e75337b619ac51a7cadfnvdPatch
- git.kernel.org/stable/c/f4a917e6cd6c798f7adf39907f117fc754db1283nvdPatch
- lists.debian.org/debian-lts-announce/2025/10/msg00008.htmlnvdMailing ListThird Party Advisory
- cert-portal.siemens.com/productcert/html/ssa-032379.htmlnvd
News mentions
1- Siemens SIMATICCISA ICS Advisories