CVE-2025-68364
Description
In the Linux kernel, the following vulnerability has been resolved:
ocfs2: relax BUG() to ocfs2_error() in __ocfs2_move_extent()
In '__ocfs2_move_extent()', relax 'BUG()' to 'ocfs2_error()' just to avoid crashing the whole kernel due to a filesystem corruption.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In the Linux kernel's ocfs2 filesystem, a BUG() in __ocfs2_move_extent() is replaced with ocfs2_error() to prevent a kernel crash from filesystem corruption.
Vulnerability
Analysis
In the Linux kernel's ocfs2 (Oracle Cluster File System, the function __ocfs2_move_extent() previously contained a BUG() macro that would trigger a kernel panic when encountering certain filesystem corruption states. This vulnerability, identified as CVE-2025-68364, addresses the overly aggressive crash behavior by relaxing the BUG() to an ocfs2_error() call, which logs the error and returns an appropriate error code without crashing the entire system [1][2][3].
The root cause is that the BUG() invocation was designed to catch an internal inconsistency, but in practice it could be triggered by a corrupted on-disk filesystem image or by an attacker with the ability to manipulate the filesystem metadata. By converting this to a graceful error handling path, the kernel avoids a denial-of-service condition that would otherwise result in a system crash.
Exploitation of this vulnerability would require either local access to mount a maliciously crafted ocfs2 filesystem or the ability to corrupt the filesystem metadata through other means. The attack surface is limited to systems using the ocfs2 filesystem, which is primarily used in cluster environments. No authentication is needed beyond the ability to trigger the filesystem operation that reaches the vulnerable code path.
The impact is a denial-of-service condition: an unprivileged user or a corrupted filesystem could cause a kernel panic, crashing the entire system. The fix, which has been applied to the stable kernel tree, replaces the crash with a filesystem-level error that allows the system to continue operating, albeit with the affected filesystem operation failing. Users are advised to apply the kernel update containing this commit to mitigate the issue.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- git.kernel.org/stable/c/08b93c1c12c66989316883d733475c64d14de5d2nvd
- git.kernel.org/stable/c/1ad2f81a099b8df5f72bce0a3e9f531263a846b8nvd
- git.kernel.org/stable/c/7abbe41d22a06aae00fd46d29f59dd40a01e988fnvd
- git.kernel.org/stable/c/8a7d58845fae061c62b50bc5eeb9bae4a1dedc3dnvd
- git.kernel.org/stable/c/bcb94288d95cfc52f4d7cead260f4db54c8c741anvd
- git.kernel.org/stable/c/cb34a55f552960c74e26b3699c84745b96e3131anvd
- git.kernel.org/stable/c/e5c2503696ec2e0dc7b2aee902dc859ccde39ddfnvd
- git.kernel.org/stable/c/e5c52c320577cd405b251943ef77842dc6f303bfnvd
News mentions
0No linked articles in our index yet.