CVE-2025-39743
jfs: truncate good inode pages when hard link is 0
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: jfs: truncate good inode pages when hard link is 0 The fileset value of the inode copy from the disk by the reproducer is AGGR_RESERVED_I. When executing evict, its hard link number is 0, so its inode pages are not truncated. This causes the bugon to be triggered when executing clear_inode() because nrpages is greater than 0.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Sep 11, 2025 |
| Last Updated | May 12, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
32983696a48a6c41d99f3eca82ba7510a552d843 < 89fff8e3d6710fc32507b8e19eb5afa9fb79b896 32983696a48a6c41d99f3eca82ba7510a552d843 < 5845b926c561b8333cd65169526eec357d7bb449 32983696a48a6c41d99f3eca82ba7510a552d843 < 8ed7275910fb7177012619864e04d3008763f3ea 32983696a48a6c41d99f3eca82ba7510a552d843 < b5b471820c33365a8ccd2d463578bf4e47056c2c 32983696a48a6c41d99f3eca82ba7510a552d843 < 34d8e982bac48bdcca7524644a8825a580edce74 32983696a48a6c41d99f3eca82ba7510a552d843 < df3fd8daf278eca365f221749ae5b728e8382a04 32983696a48a6c41d99f3eca82ba7510a552d843 < 2b1d5ca395a5fb170c3f885cd42c16179f7f54ec 32983696a48a6c41d99f3eca82ba7510a552d843 < 1bb5cdc3e39f0c2b311fcb631258b7e60d3fb0d3 32983696a48a6c41d99f3eca82ba7510a552d843 < 2d91b3765cd05016335cd5df5e5c6a29708ec058
Linux / Linux
2.6.14
References
git.kernel.org: https://git.kernel.org/stable/c/89fff8e3d6710fc32507b8e19eb5afa9fb79b896 git.kernel.org: https://git.kernel.org/stable/c/5845b926c561b8333cd65169526eec357d7bb449 git.kernel.org: https://git.kernel.org/stable/c/8ed7275910fb7177012619864e04d3008763f3ea git.kernel.org: https://git.kernel.org/stable/c/b5b471820c33365a8ccd2d463578bf4e47056c2c git.kernel.org: https://git.kernel.org/stable/c/34d8e982bac48bdcca7524644a8825a580edce74 git.kernel.org: https://git.kernel.org/stable/c/df3fd8daf278eca365f221749ae5b728e8382a04 git.kernel.org: https://git.kernel.org/stable/c/2b1d5ca395a5fb170c3f885cd42c16179f7f54ec git.kernel.org: https://git.kernel.org/stable/c/1bb5cdc3e39f0c2b311fcb631258b7e60d3fb0d3 git.kernel.org: https://git.kernel.org/stable/c/2d91b3765cd05016335cd5df5e5c6a29708ec058 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-032379.html