VYPR
Medium severity5.5NVD Advisory· Published Sep 19, 2025· Updated May 12, 2026

CVE-2025-39842

CVE-2025-39842

Description

In the Linux kernel, the following vulnerability has been resolved:

ocfs2: prevent release journal inode after journal shutdown

Before calling ocfs2_delete_osb(), ocfs2_journal_shutdown() has already been executed in ocfs2_dismount_volume(), so osb->journal must be NULL. Therefore, the following calltrace will inevitably fail when it reaches jbd2_journal_release_jbd_inode().

ocfs2_dismount_volume()-> ocfs2_delete_osb()-> ocfs2_free_slot_info()-> __ocfs2_free_slot_info()-> evict()-> ocfs2_evict_inode()-> ocfs2_clear_inode()-> jbd2_journal_release_jbd_inode(osb->journal->j_journal,

Adding osb->journal checks will prevent null-ptr-deref during the above execution path.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel's ocfs2 filesystem, a null-pointer dereference occurs when the journal is already shut down but the release path still accesses it, fixed by adding a NULL check.

Vulnerability

Overview

CVE-2025-39842 is a null-pointer dereference vulnerability in the Linux kernel's Oracle Cluster File System 2 (ocfs2). The root cause is a missing check for osb->journal being NULL after ocfs2_journal_shutdown() has been called during the unmount sequence. When ocfs2_dismount_volume() calls ocfs2_journal_shutdown(), the journal pointer is set to NULL. Subsequently, ocfs2_delete_osb() triggers a call chain that eventually reaches jbd2_journal_release_jbd_inode(), which dereferences the now-NULL journal pointer, causing a crash [1][2].

Exploitation

Conditions

An attacker would need to be able to trigger the unmount of an ocfs2 filesystem, which typically requires local access and the ability to unmount a volume. The vulnerability is triggered during normal system shutdown or filesystem unmount operations, not through remote exploitation. No authentication is required beyond the ability to execute the unmount command [1].

Impact

If exploited, this vulnerability leads to a kernel panic (denial of service) due to the null-pointer dereference. The system becomes unavailable until reboot. There is no evidence of privilege escalation or data corruption from this bug [1].

Mitigation

The fix adds a simple NULL check for osb->journal before calling jbd2_journal_release_jbd_inode(), preventing the dereference. The patch has been applied to the Linux kernel stable branches [2][3][4]. Users should update to a kernel version containing the fix. Siemens has also listed this CVE as affecting SIMATIC CN 4100 devices running versions before V5.0, and recommends updating to V5.0 or later [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1
  • Linux/Linuxv5
    Range: 5.16

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

7

News mentions

1