{"id":"CVE-2025-68364","summary":"ocfs2: relax BUG() to ocfs2_error() in __ocfs2_move_extent()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: relax BUG() to ocfs2_error() in __ocfs2_move_extent()\n\nIn '__ocfs2_move_extent()', relax 'BUG()' to 'ocfs2_error()' just\nto avoid crashing the whole kernel due to a filesystem corruption.","modified":"2026-04-02T13:03:35.967682Z","published":"2025-12-24T10:32:51.922Z","related":["openSUSE-SU-2026:10039-1","openSUSE-SU-2026:10301-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68364.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/08b93c1c12c66989316883d733475c64d14de5d2"},{"type":"WEB","url":"https://git.kernel.org/stable/c/1ad2f81a099b8df5f72bce0a3e9f531263a846b8"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7abbe41d22a06aae00fd46d29f59dd40a01e988f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8a7d58845fae061c62b50bc5eeb9bae4a1dedc3d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/bcb94288d95cfc52f4d7cead260f4db54c8c741a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/cb34a55f552960c74e26b3699c84745b96e3131a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e5c2503696ec2e0dc7b2aee902dc859ccde39ddf"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e5c52c320577cd405b251943ef77842dc6f303bf"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68364.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-68364"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"8f603e567aa7a243e68ca48b4f105b990851360f"},{"fixed":"cb34a55f552960c74e26b3699c84745b96e3131a"},{"fixed":"08b93c1c12c66989316883d733475c64d14de5d2"},{"fixed":"1ad2f81a099b8df5f72bce0a3e9f531263a846b8"},{"fixed":"bcb94288d95cfc52f4d7cead260f4db54c8c741a"},{"fixed":"e5c2503696ec2e0dc7b2aee902dc859ccde39ddf"},{"fixed":"7abbe41d22a06aae00fd46d29f59dd40a01e988f"},{"fixed":"e5c52c320577cd405b251943ef77842dc6f303bf"},{"fixed":"8a7d58845fae061c62b50bc5eeb9bae4a1dedc3d"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-68364.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"3.0.0"},{"fixed":"5.10.248"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.198"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.160"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.120"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.12.63"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.13.0"},{"fixed":"6.17.13"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.18.0"},{"fixed":"6.18.2"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-68364.json"}}],"schema_version":"1.7.5"}