ocfs2: fix reflink preserve cleanup issue

Summary

CVECVE-2026-43168
StatePUBLISHED
AssignerLinux
Source PriorityCVE Program / NVD first with legacy fallback
Published2026-05-06 12:16:35 UTC
Updated2026-05-06 13:07:51 UTC
DescriptionIn the Linux kernel, the following vulnerability has been resolved: ocfs2: fix reflink preserve cleanup issue commit c06c303832ec ("ocfs2: fix xattr array entry __counted_by error") doesn't handle all cases and the cleanup job for preserved xattr entries still has bug: - the 'last' pointer should be shifted by one unit after cleanup an array entry. - current code logic doesn't cleanup the first entry when xh_count is 1. Note, commit c06c303832ec is also a bug fix for 0fe9b66c65f3.

Vendor Declared Affected Products

SourceVendorProductVersionPlatforms
CNA Linux Linux affected 0fe9b66c65f3ff227da45381afe7612f91e32740 c44d86ca949cb1e5566ad14510cc26fa1a17e2d8 git Not specified
CNA Linux Linux affected 0fe9b66c65f3ff227da45381afe7612f91e32740 02acc9f72365e50eb45a56b7dacb9114ca3b503c git Not specified
CNA Linux Linux affected 0fe9b66c65f3ff227da45381afe7612f91e32740 8ff329353134280b203cb2bce95311cb8f7cbd8a git Not specified
CNA Linux Linux affected 0fe9b66c65f3ff227da45381afe7612f91e32740 bb273b68c1719c2925e05557f7e7099edb066680 git Not specified
CNA Linux Linux affected 0fe9b66c65f3ff227da45381afe7612f91e32740 b2952dbeac2c3c527cb0519d5ffaeb95b062466a git Not specified
CNA Linux Linux affected 0fe9b66c65f3ff227da45381afe7612f91e32740 3bdc3766aafb052aef4baadef455a84c1c0a059d git Not specified
CNA Linux Linux affected 0fe9b66c65f3ff227da45381afe7612f91e32740 2f4daccd9d9b8b2952df7878df8c2e8ba6439398 git Not specified
CNA Linux Linux affected 0fe9b66c65f3ff227da45381afe7612f91e32740 5138c936c2c82c9be8883921854bc6f7e1177d8c git Not specified
CNA Linux Linux affected 2.6.32 Not specified
CNA Linux Linux unaffected 2.6.32 semver Not specified
CNA Linux Linux unaffected 5.10.252 5.10.* semver Not specified
CNA Linux Linux unaffected 5.15.202 5.15.* semver Not specified
CNA Linux Linux unaffected 6.1.165 6.1.* semver Not specified
CNA Linux Linux unaffected 6.6.128 6.6.* semver Not specified
CNA Linux Linux unaffected 6.12.75 6.12.* semver Not specified
CNA Linux Linux unaffected 6.18.16 6.18.* semver Not specified
CNA Linux Linux unaffected 6.19.6 6.19.* semver Not specified
CNA Linux Linux unaffected 7.0 * original_commit_for_fix Not specified

References

ReferenceSourceLinkTags
git.kernel.org/stable/c/b2952dbeac2c3c527cb0519d5ffaeb95b062466a 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/c44d86ca949cb1e5566ad14510cc26fa1a17e2d8 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/5138c936c2c82c9be8883921854bc6f7e1177d8c 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/2f4daccd9d9b8b2952df7878df8c2e8ba6439398 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/3bdc3766aafb052aef4baadef455a84c1c0a059d 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/bb273b68c1719c2925e05557f7e7099edb066680 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/02acc9f72365e50eb45a56b7dacb9114ca3b503c 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/8ff329353134280b203cb2bce95311cb8f7cbd8a 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report