ocfs2: fix reflink preserve cleanup issue
Summary
| CVE | CVE-2026-43168 |
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-05-06 12:16:35 UTC |
| Updated | 2026-05-06 13:07:51 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved:
ocfs2: fix reflink preserve cleanup issue
commit c06c303832ec ("ocfs2: fix xattr array entry __counted_by error")
doesn't handle all cases and the cleanup job for preserved xattr entries
still has bug:
- the 'last' pointer should be shifted by one unit after cleanup
an array entry.
- current code logic doesn't cleanup the first entry when xh_count is 1.
Note, commit c06c303832ec is also a bug fix for 0fe9b66c65f3. |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|
| CNA |
Linux |
Linux |
affected 0fe9b66c65f3ff227da45381afe7612f91e32740 c44d86ca949cb1e5566ad14510cc26fa1a17e2d8 git |
Not specified |
| CNA |
Linux |
Linux |
affected 0fe9b66c65f3ff227da45381afe7612f91e32740 02acc9f72365e50eb45a56b7dacb9114ca3b503c git |
Not specified |
| CNA |
Linux |
Linux |
affected 0fe9b66c65f3ff227da45381afe7612f91e32740 8ff329353134280b203cb2bce95311cb8f7cbd8a git |
Not specified |
| CNA |
Linux |
Linux |
affected 0fe9b66c65f3ff227da45381afe7612f91e32740 bb273b68c1719c2925e05557f7e7099edb066680 git |
Not specified |
| CNA |
Linux |
Linux |
affected 0fe9b66c65f3ff227da45381afe7612f91e32740 b2952dbeac2c3c527cb0519d5ffaeb95b062466a git |
Not specified |
| CNA |
Linux |
Linux |
affected 0fe9b66c65f3ff227da45381afe7612f91e32740 3bdc3766aafb052aef4baadef455a84c1c0a059d git |
Not specified |
| CNA |
Linux |
Linux |
affected 0fe9b66c65f3ff227da45381afe7612f91e32740 2f4daccd9d9b8b2952df7878df8c2e8ba6439398 git |
Not specified |
| CNA |
Linux |
Linux |
affected 0fe9b66c65f3ff227da45381afe7612f91e32740 5138c936c2c82c9be8883921854bc6f7e1177d8c git |
Not specified |
| CNA |
Linux |
Linux |
affected 2.6.32 |
Not specified |
| CNA |
Linux |
Linux |
unaffected 2.6.32 semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 5.10.252 5.10.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 5.15.202 5.15.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.1.165 6.1.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.6.128 6.6.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.12.75 6.12.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.18.16 6.18.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.19.6 6.19.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 7.0 * original_commit_for_fix |
Not specified |
References
| Reference | Source | Link | Tags |
|---|
| git.kernel.org/stable/c/b2952dbeac2c3c527cb0519d5ffaeb95b062466a |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/c44d86ca949cb1e5566ad14510cc26fa1a17e2d8 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/5138c936c2c82c9be8883921854bc6f7e1177d8c |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/2f4daccd9d9b8b2952df7878df8c2e8ba6439398 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/3bdc3766aafb052aef4baadef455a84c1c0a059d |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/bb273b68c1719c2925e05557f7e7099edb066680 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/02acc9f72365e50eb45a56b7dacb9114ca3b503c |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/8ff329353134280b203cb2bce95311cb8f7cbd8a |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.