๐Ÿ” CVE Alert

CVE-2025-39743

UNKNOWN 0.0

jfs: truncate good inode pages when hard link is 0

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: jfs: truncate good inode pages when hard link is 0 The fileset value of the inode copy from the disk by the reproducer is AGGR_RESERVED_I. When executing evict, its hard link number is 0, so its inode pages are not truncated. This causes the bugon to be triggered when executing clear_inode() because nrpages is greater than 0.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Sep 11, 2025
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
32983696a48a6c41d99f3eca82ba7510a552d843 < 89fff8e3d6710fc32507b8e19eb5afa9fb79b896 32983696a48a6c41d99f3eca82ba7510a552d843 < 5845b926c561b8333cd65169526eec357d7bb449 32983696a48a6c41d99f3eca82ba7510a552d843 < 8ed7275910fb7177012619864e04d3008763f3ea 32983696a48a6c41d99f3eca82ba7510a552d843 < b5b471820c33365a8ccd2d463578bf4e47056c2c 32983696a48a6c41d99f3eca82ba7510a552d843 < 34d8e982bac48bdcca7524644a8825a580edce74 32983696a48a6c41d99f3eca82ba7510a552d843 < df3fd8daf278eca365f221749ae5b728e8382a04 32983696a48a6c41d99f3eca82ba7510a552d843 < 2b1d5ca395a5fb170c3f885cd42c16179f7f54ec 32983696a48a6c41d99f3eca82ba7510a552d843 < 1bb5cdc3e39f0c2b311fcb631258b7e60d3fb0d3 32983696a48a6c41d99f3eca82ba7510a552d843 < 2d91b3765cd05016335cd5df5e5c6a29708ec058
Linux / Linux
2.6.14

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/89fff8e3d6710fc32507b8e19eb5afa9fb79b896 git.kernel.org: https://git.kernel.org/stable/c/5845b926c561b8333cd65169526eec357d7bb449 git.kernel.org: https://git.kernel.org/stable/c/8ed7275910fb7177012619864e04d3008763f3ea git.kernel.org: https://git.kernel.org/stable/c/b5b471820c33365a8ccd2d463578bf4e47056c2c git.kernel.org: https://git.kernel.org/stable/c/34d8e982bac48bdcca7524644a8825a580edce74 git.kernel.org: https://git.kernel.org/stable/c/df3fd8daf278eca365f221749ae5b728e8382a04 git.kernel.org: https://git.kernel.org/stable/c/2b1d5ca395a5fb170c3f885cd42c16179f7f54ec git.kernel.org: https://git.kernel.org/stable/c/1bb5cdc3e39f0c2b311fcb631258b7e60d3fb0d3 git.kernel.org: https://git.kernel.org/stable/c/2d91b3765cd05016335cd5df5e5c6a29708ec058 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-032379.html