CVE-2025-68337

Source
https://cve.org/CVERecord?id=CVE-2025-68337
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68337.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-68337
Downstream
Related
Published
2025-12-22T16:14:14.145Z
Modified
2026-03-20T12:46:22.554964Z
Summary
jbd2: avoid bug_on in jbd2_journal_get_create_access() when file system corrupted
Details

In the Linux kernel, the following vulnerability has been resolved:

jbd2: avoid bugon in jbd2journalgetcreate_access() when file system corrupted

There's issue when file system corrupted: ------------[ cut here ]------------ kernel BUG at fs/jbd2/transaction.c:1289! Oops: invalid opcode: 0000 [#1] SMP KASAN PTI CPU: 5 UID: 0 PID: 2031 Comm: mkdir Not tainted 6.18.0-rc1-next RIP: 0010:jbd2journalgetcreateaccess+0x3b6/0x4d0 RSP: 0018:ffff888117aafa30 EFLAGS: 00010202 RAX: 0000000000000000 RBX: ffff88811a86b000 RCX: ffffffff89a63534 RDX: 1ffff110200ec602 RSI: 0000000000000004 RDI: ffff888100763010 RBP: ffff888100763000 R08: 0000000000000001 R09: ffff888100763028 R10: 0000000000000003 R11: 0000000000000000 R12: 0000000000000000 R13: ffff88812c432000 R14: ffff88812c608000 R15: ffff888120bfc000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f91d6970c99 CR3: 00000001159c4000 CR4: 00000000000006f0 Call Trace: <TASK> __ext4journalget_createaccess+0x42/0x170 ext4getblk+0x319/0x6f0 ext4bread+0x11/0x100 ext4append+0x1e6/0x4a0 ext4initnewdir+0x145/0x1d0 ext4mkdir+0x326/0x920 vfsmkdir+0x45c/0x740 domkdirat+0x234/0x2f0 __x64sysmkdir+0xd6/0x120 dosyscall64+0x5f/0xfa0 entrySYSCALL64afterhwframe+0x76/0x7e

The above issue occurs with us in errors=continue mode when accompanied by storage failures. There have been many inconsistencies in the file system data. In the case of file system data inconsistency, for example, if the block bitmap of a referenced block is not set, it can lead to the situation where a block being committed is allocated and used again. As a result, the following condition will not be satisfied then trigger BUGON. Of course, it is entirely possible to construct a problematic image that can trigger this BUGON through specific operations. In fact, I have constructed such an image and easily reproduced this issue. Therefore, JASSERT() holds true only under ideal conditions, but it may not necessarily be satisfied in exceptional scenarios. Using JASSERT() directly in abnormal situations would cause the system to crash, which is clearly not what we want. So here we directly trigger a JBD abort instead of immediately invoking BUG_ON.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68337.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
470decc613ab2048b619a01028072d932d9086ee
Fixed
71bbe06c40fc59b5b15661eca8ff307f4176d7f9
Fixed
ed62fd8c15d41c4127ad16b8219b63124f5962bc
Fixed
3faac6531d4818cd6be45e5bbf32937bbbc795c0
Fixed
b4f8eabf6d991bd41fabcdf9302c4b3eab590cf4
Fixed
a2a7f854d154a3e9232fec80782dad951655f52f
Fixed
bf34c72337e40c4670cceeb79b353356933a254b
Fixed
aa1703f3f706ea0867fb1991dcac709c9ec94cfb
Fixed
986835bf4d11032bba4ab8414d18fce038c61bb4

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68337.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.6.19
Fixed
5.10.248
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.198
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.160
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.120
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.62
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.17.12
Type
ECOSYSTEM
Events
Introduced
6.18.0
Fixed
6.18.1

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68337.json"