CVE-2025-38230

Source
https://cve.org/CVERecord?id=CVE-2025-38230
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38230.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-38230
Downstream
Published
2025-07-04T13:37:44.264Z
Modified
2026-03-20T12:42:45.564925Z
Summary
jfs: validate AG parameters in dbMount() to prevent crashes
Details

In the Linux kernel, the following vulnerability has been resolved:

jfs: validate AG parameters in dbMount() to prevent crashes

Validate dbagheight, dbagwidth, and db_agstart in dbMount to catch corrupted metadata early and avoid undefined behavior in dbAllocAG. Limits are derived from L2LPERCTL, LPERCTL/MAXAG, and CTLTREESIZE:

  • agheight: 0 to L2LPERCTL/2 (0 to 5) ensures shift (L2LPERCTL - 2*agheight) >= 0.
  • agwidth: 1 to min(LPERCTL/MAXAG, 2^(L2LPERCTL - 2agheight)) ensures agperlev >= 1.
    • Ranges: 1-8 (agheight 0-3), 1-4 (agheight 4), 1 (agheight 5).
    • LPERCTL/MAXAG = 1024/128 = 8 limits leaves per AG; 2^(10 - 2agheight) prevents division to 0.
  • agstart: 0 to CTLTREESIZE-1 - agwidth*(MAXAG-1) keeps ti within stree (size 1365).
    • Ranges: 0-1237 (agwidth 1), 0-348 (agwidth 8).

UBSAN: shift-out-of-bounds in fs/jfs/jfs_dmap.c:1400:9 shift exponent -335544310 is negative CPU: 0 UID: 0 PID: 5822 Comm: syz-executor130 Not tainted 6.14.0-rc5-syzkaller #0 Hardware name: Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Call Trace: <TASK> __dumpstack lib/dumpstack.c:94 [inline] dumpstacklvl+0x241/0x360 lib/dumpstack.c:120 ubsanepilogue lib/ubsan.c:231 [inline] __ubsanhandleshiftoutofbounds+0x3c8/0x420 lib/ubsan.c:468 dbAllocAG+0x1087/0x10b0 fs/jfs/jfsdmap.c:1400 dbDiscardAG+0x352/0xa20 fs/jfs/jfsdmap.c:1613 jfsioctrim+0x45a/0x6b0 fs/jfs/jfsdiscard.c:105 jfsioctl+0x2cd/0x3e0 fs/jfs/ioctl.c:131 vfsioctl fs/ioctl.c:51 [inline] __dosysioctl fs/ioctl.c:906 [inline] __sesysioctl+0xf5/0x170 fs/ioctl.c:892 dosyscallx64 arch/x86/entry/common.c:52 [inline] dosyscall64+0xf3/0x230 arch/x86/entry/common.c:83 entrySYSCALL64afterhwframe+0x77/0x7f

Found by Linux Verification Center (linuxtesting.org) with Syzkaller.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38230.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Fixed
95ae5ee6069d9a5945772625f289422ef659221a
Fixed
a4259e72363e1ea204a97292001a9fc36c7e52fd
Fixed
c3705c82b7406a15ef38a610d03bf6baa43d6e0c
Fixed
9242ff6245527a3ebb693ddd175493b38ddca72f
Fixed
0c40fa81f850556e9aa0185fede9ef1112db7b39
Fixed
8b69608c6b6779a7ab07ce4467a56df90152cfb9
Fixed
b62a1e59d8716bbd2e73660743fe06acc97ed7d1
Fixed
37bfb464ddca87f203071b5bd562cd91ddc0b40a

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38230.json"