CVE-2025-39734 (GCVE-0-2025-39734)
Vulnerability from cvelistv5
Published
2025-09-07 15:16
Modified
2025-09-29 05:58
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: Revert "fs/ntfs3: Replace inode_trylock with inode_lock" This reverts commit 69505fe98f198ee813898cbcaf6770949636430b. Initially, conditional lock acquisition was removed to fix an xfstest bug that was observed during internal testing. The deadlock reported by syzbot is resolved by reintroducing conditional acquisition. The xfstest bug no longer occurs on kernel version 6.16-rc1 during internal testing. I assume that changes in other modules may have contributed to this.
Impacted products
Vendor Product Version
Linux Linux Version: e3e3b3eb54feaf6400800812c8d0f95a7213923d
Version: 7a498fc945080bccc25fdc36f1d663798441158b
Version: 53173e3865acb06f3e86c703696510c12fecc612
Version: 69505fe98f198ee813898cbcaf6770949636430b
Version: 69505fe98f198ee813898cbcaf6770949636430b
Version: 69505fe98f198ee813898cbcaf6770949636430b
Version: 69505fe98f198ee813898cbcaf6770949636430b
Version: d5ad80aabd5a76a5de52b7663b1f3223dd01ea38
Create a notification for this product.
   Linux Linux Version: 6.11
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "fs/ntfs3/file.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "bec8109f957a6e193e52d1728799994c8005ca83",
              "status": "affected",
              "version": "e3e3b3eb54feaf6400800812c8d0f95a7213923d",
              "versionType": "git"
            },
            {
              "lessThan": "1903a6c1f2818154f6bc87bceaaecafa92b6ac5c",
              "status": "affected",
              "version": "7a498fc945080bccc25fdc36f1d663798441158b",
              "versionType": "git"
            },
            {
              "lessThan": "a936be9b5f51c4d23f66fb673e9068c6b08104a4",
              "status": "affected",
              "version": "53173e3865acb06f3e86c703696510c12fecc612",
              "versionType": "git"
            },
            {
              "lessThan": "b356ee013a79e7e3147bfe065de376706c5d2ee9",
              "status": "affected",
              "version": "69505fe98f198ee813898cbcaf6770949636430b",
              "versionType": "git"
            },
            {
              "lessThan": "7ce6f83ca9d52c9245b7a017466fc4baa1241b0b",
              "status": "affected",
              "version": "69505fe98f198ee813898cbcaf6770949636430b",
              "versionType": "git"
            },
            {
              "lessThan": "bd20733746263acaaf2a21881665db27ee4303d5",
              "status": "affected",
              "version": "69505fe98f198ee813898cbcaf6770949636430b",
              "versionType": "git"
            },
            {
              "lessThan": "a49f0abd8959048af18c6c690b065eb0d65b2d21",
              "status": "affected",
              "version": "69505fe98f198ee813898cbcaf6770949636430b",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "d5ad80aabd5a76a5de52b7663b1f3223dd01ea38",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "fs/ntfs3/file.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "6.11"
            },
            {
              "lessThan": "6.11",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.190",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.148",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.102",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.12.*",
              "status": "unaffected",
              "version": "6.12.42",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.15.*",
              "status": "unaffected",
              "version": "6.15.10",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.16.*",
              "status": "unaffected",
              "version": "6.16.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.17",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.190",
                  "versionStartIncluding": "5.15.165",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.148",
                  "versionStartIncluding": "6.1.103",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.6.102",
                  "versionStartIncluding": "6.6.44",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.12.42",
                  "versionStartIncluding": "6.11",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.15.10",
                  "versionStartIncluding": "6.11",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.16.1",
                  "versionStartIncluding": "6.11",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.17",
                  "versionStartIncluding": "6.11",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "6.10.3",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nRevert \"fs/ntfs3: Replace inode_trylock with inode_lock\"\n\nThis reverts commit 69505fe98f198ee813898cbcaf6770949636430b.\n\nInitially, conditional lock acquisition was removed to fix an xfstest bug\nthat was observed during internal testing. The deadlock reported by syzbot\nis resolved by reintroducing conditional acquisition. The xfstest bug no\nlonger occurs on kernel version 6.16-rc1 during internal testing. I\nassume that changes in other modules may have contributed to this."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-09-29T05:58:20.676Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/bec8109f957a6e193e52d1728799994c8005ca83"
        },
        {
          "url": "https://git.kernel.org/stable/c/1903a6c1f2818154f6bc87bceaaecafa92b6ac5c"
        },
        {
          "url": "https://git.kernel.org/stable/c/a936be9b5f51c4d23f66fb673e9068c6b08104a4"
        },
        {
          "url": "https://git.kernel.org/stable/c/b356ee013a79e7e3147bfe065de376706c5d2ee9"
        },
        {
          "url": "https://git.kernel.org/stable/c/7ce6f83ca9d52c9245b7a017466fc4baa1241b0b"
        },
        {
          "url": "https://git.kernel.org/stable/c/bd20733746263acaaf2a21881665db27ee4303d5"
        },
        {
          "url": "https://git.kernel.org/stable/c/a49f0abd8959048af18c6c690b065eb0d65b2d21"
        }
      ],
      "title": "Revert \"fs/ntfs3: Replace inode_trylock with inode_lock\"",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2025-39734",
    "datePublished": "2025-09-07T15:16:22.015Z",
    "dateReserved": "2025-04-16T07:20:57.119Z",
    "dateUpdated": "2025-09-29T05:58:20.676Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2025-39734\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-09-07T16:15:50.370\",\"lastModified\":\"2025-09-08T16:25:38.810\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nRevert \\\"fs/ntfs3: Replace inode_trylock with inode_lock\\\"\\n\\nThis reverts commit 69505fe98f198ee813898cbcaf6770949636430b.\\n\\nInitially, conditional lock acquisition was removed to fix an xfstest bug\\nthat was observed during internal testing. The deadlock reported by syzbot\\nis resolved by reintroducing conditional acquisition. The xfstest bug no\\nlonger occurs on kernel version 6.16-rc1 during internal testing. I\\nassume that changes in other modules may have contributed to this.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/1903a6c1f2818154f6bc87bceaaecafa92b6ac5c\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/7ce6f83ca9d52c9245b7a017466fc4baa1241b0b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/a49f0abd8959048af18c6c690b065eb0d65b2d21\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/a936be9b5f51c4d23f66fb673e9068c6b08104a4\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/b356ee013a79e7e3147bfe065de376706c5d2ee9\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/bd20733746263acaaf2a21881665db27ee4303d5\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/bec8109f957a6e193e52d1728799994c8005ca83\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…